Summary
Detail | |||
---|---|---|---|
Vendor | live555 | First view | 2018-10-19 |
Product | live555 Media Server | Last view | 2018-10-19 |
Version | 0.92 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:live555:live555_media_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2018-10-19 | CVE-2018-4013 | An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library version 0.92. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-787 | Out-of-bounds Write |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | TRUFFLEHUNTER TALOS-2018-0684 attack attempt RuleID : 48068 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2018-0684 attack attempt RuleID : 48067 - Type : SERVER-WEBAPP - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-11-26 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4343.nasl - Type: ACT_GATHER_INFO |
2018-11-21 | Name: The remote Debian host is missing a security update. File: debian_DLA-1582.nasl - Type: ACT_GATHER_INFO |
2018-10-29 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_fa194483dabd11e8bf395404a68ad561.nasl - Type: ACT_GATHER_INFO |