Open zounathan opened 5 years ago
This was assigned CVE-2019-7733.
This was addressed in 2019.05.12, please close.
This was addressed in 2019.05.12, please close.
Could you kindly point me to the commit that fixed the issue ? Thanks :)
This was addressed in 2019.05.12, please close. http://www.live555.com/liveMedia/public/changelog.txt
Could you kindly point me to the commit that fixed the issue ? Thanks :)
@NicoleG25 As far as I recall: ef01f0a7db9d7a7660658d088e36c4c4d0d02e27, this line in particular https://github.com/rgaufman/live555/blob/master/liveMedia/RTSPServer.cpp#L717.
When parse the request packet in function handleRequestBytes, the code don't check the
content-length
, and use it in memmove. Finally cause the buff overflow.There is a
content-length
check, but it only assignsparseSucceeded
to false. This can't avoid thememmove
.I can make the server crash with a simple packet.