Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaw in Media Library Impacts VLC, Other Software

A serious vulnerability in the LIVE555 Streaming Media RTSP server affects popular applications, including VLC, MPlayer and others, Cisco Talos has discovered.

A serious vulnerability in the LIVE555 Streaming Media RTSP server affects popular applications, including VLC, MPlayer and others, Cisco Talos has discovered.

Developed by Live Networks, Inc, LIVE555 Streaming Media represents a set of open-source C++ libraries meant for multimedia streaming. The libraries provide support for open standards used in streaming, but can also be used for the management of various popular video and audio formats. In addition to media players, the libraries are used for cameras and other embedded devices.

Recently, security researcher Lilith Wyatt of Cisco Talos discovered an exploitable code execution bug in the HTTP packet-parsing functionality of the LIVE555 RTSP server library. An attacker can achieve code execution by sending a specially crafted packet to cause a stack-based buffer overflow.

Tracked as CVE-2018-4013, the vulnerability was found in a function that parses HTTP headers for tunneling RTSP over HTTP. The ability to tunnel RTSP over HTTP, enabled by LIVE555 for the standard RTSP server, is served by a different port bound by the server.

Typically, port TCP 80, 8000, or 8080 is used, based on what is available on the host machine, because the port includes support for normal RTSP. However, it is also possible for the HTTP client to negotiate the RTSP-over-HTTP tunnel.

To exploit the security bug, an attacker could create a packet containing multiple “Accept:” or “x-sessioncookie” strings, thus leading to a stack buffer overflow in the function “lookForHeader.”

The vulnerability, which has a CVSSv3 score of 10.0, has been confirmed to affect Live Networks LIVE555 Media Server version 0.92 (older versions may also be impacted). Live Networks addressed the vulnerability last week.

Related: SDL Development Library Allows Code Execution via GIMP Files

Advertisement. Scroll to continue reading.

Related: GitHub Security Alerts Lead to Fewer Vulnerable Code Libraries

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.