Live555 through 1.08 does not handle socket connections properly. A huge number of incoming socket connections in a short time invokes the error-handling module, in which a heap-based buffer overflow happens. An attacker can leverage this to launch a DoS attack.
References
Link | Resource |
---|---|
http://lists.live555.com/pipermail/live-devel/2021-September/021994.html | Exploit Mailing List Vendor Advisory |
http://www.live555.com/liveMedia/public/changelog.txt | Release Notes Vendor Advisory |
http://lists.live555.com/pipermail/live-devel/2021-September/021994.html | Exploit Mailing List Vendor Advisory |
http://www.live555.com/liveMedia/public/changelog.txt | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.live555.com/pipermail/live-devel/2021-September/021994.html - Exploit, Mailing List, Vendor Advisory | |
References | () http://www.live555.com/liveMedia/public/changelog.txt - Release Notes, Vendor Advisory |
Information
Published : 2022-07-12 14:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41396
Mitre link : CVE-2021-41396
CVE.ORG link : CVE-2021-41396
JSON object : View
Products Affected
live555
- live555
CWE
CWE-787
Out-of-bounds Write