A Denial of Service issue was discovered in the LIVE555 Streaming Media libraries as used in Live555 Media Server 0.93. It can cause an RTSPServer crash in handleHTTPCmd_TunnelingPOST, when RTSP-over-HTTP tunneling is supported, via x-sessioncookie HTTP headers in a GET request and a POST request within the same TCP session. This occurs because of a call to an incorrect virtual function pointer in the readSocket function in GroupsockHelper.cpp.
References
Link | Resource |
---|---|
https://github.com/rgaufman/live555/issues/19 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00037.html | Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2019/Mar/22 | Issue Tracking Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202005-06 | |
https://www.debian.org/security/2019/dsa-4408 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-01-14 08:29
Updated : 2024-02-28 16:48
NVD link : CVE-2019-6256
Mitre link : CVE-2019-6256
CVE.ORG link : CVE-2019-6256
JSON object : View
Products Affected
debian
- debian_linux
live555
- live555_media_server
CWE
CWE-755
Improper Handling of Exceptional Conditions