A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp.
References
Link | Resource |
---|---|
https://github.com/rgaufman/live555/issues/19 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2019/dsa-4408 | Third Party Advisory |
https://seclists.org/bugtraq/2019/Mar/22 | Issue Tracking Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202005-06 |
Information
Published : 2019-01-14 00:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-6256
Mitre link : CVE-2019-6256
JSON object : View
CWE
CWE-755
Improper Handling of Exceptional Conditions
Products Affected
debian
- debian_linux
live555
- live555_media_server