Executive Summary

Summary
Titleliblivemedia security update
Informations
NameDSA-4343First vendor Publication2018-11-23
VendorDebianLast vendor Modification2018-11-23
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores

Detail

It was discovered that a buffer overflow in liveMedia, a set of C ++libraries for multimedia streaming could result in the execution of arbitrary code when parsing a malformed RTSP stream.

For the stable distribution (stretch), this problem has been fixed in version 2016.11.28-1+deb9u1.

We recommend that you upgrade your liblivemedia packages.

For the detailed security status of liblivemedia please refer to its security tracker page at: https://security-tracker.debian.org/tracker/liblivemedia

Original Source

Url : http://www.debian.org/security/2018/dsa-4343

Nessus® Vulnerability Scanner

DateDescription
2018-11-26Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4343.nasl - Type : ACT_GATHER_INFO
2018-11-21Name : The remote Debian host is missing a security update.
File : debian_DLA-1582.nasl - Type : ACT_GATHER_INFO
2018-10-29Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_fa194483dabd11e8bf395404a68ad561.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2018-11-23 21:19:17
  • First insertion