Executive Summary

Titleliblivemedia security update
NameDSA-4343First vendor Publication2018-11-23
VendorDebianLast vendor Modification2018-11-23
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


It was discovered that a buffer overflow in liveMedia, a set of C ++libraries for multimedia streaming could result in the execution of arbitrary code when parsing a malformed RTSP stream.

For the stable distribution (stretch), this problem has been fixed in version 2016.11.28-1+deb9u1.

We recommend that you upgrade your liblivemedia packages.

For the detailed security status of liblivemedia please refer to its security tracker page at: https://security-tracker.debian.org/tracker/liblivemedia

Original Source

Url : http://www.debian.org/security/2018/dsa-4343

CWE : Common Weakness Enumeration

100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration


Nessus® Vulnerability Scanner

2018-11-26Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4343.nasl - Type : ACT_GATHER_INFO
2018-11-21Name : The remote Debian host is missing a security update.
File : debian_DLA-1582.nasl - Type : ACT_GATHER_INFO
2018-10-29Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_fa194483dabd11e8bf395404a68ad561.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
2019-01-25 21:21:23
  • Multiple Updates
2018-11-23 21:19:17
  • First insertion