Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.891582 |
Categoría: | Debian Local Security Checks |
Título: | Debian LTS: Security Advisory for liblivemedia (DLA-1582-1) |
Resumen: | A stack based buffer overflow vulnerability was found in liblivemedia, the;LIVE555 RTSP server library. This issue might be leveraged by remote;attackers to cause code execution, by sending a crafted packet. |
Descripción: | Summary: A stack based buffer overflow vulnerability was found in liblivemedia, the LIVE555 RTSP server library. This issue might be leveraged by remote attackers to cause code execution, by sending a crafted packet. Affected Software/OS: liblivemedia on Debian Linux Solution: For Debian 8 'Jessie', this problem has been fixed in version 2014.01.13-1+deb8u1. We recommend that you upgrade your liblivemedia packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-4013 Debian Security Information: DSA-4343 (Google Search) https://www.debian.org/security/2018/dsa-4343 https://security.gentoo.org/glsa/202005-06 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684 https://lists.debian.org/debian-lts-announce/2018/11/msg00020.html http://lists.live555.com/pipermail/live-devel/2018-October/021071.html |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |