PHZ76 RtspServer 1.0.0 RtspMesaage.cpp ParseRequestLine Pufferüberlauf

Gaskiya vulnerability da aka ware a matsayin kura an samu a PHZ76 RtspServer 1.0.0. Hakika, aikin ParseRequestLine ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil RtspMesaage.cpp, a cikin sashen $software_component. A sa manipulation ka Pufferüberlauf. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-121. Hakika, rauni an bayyana shi 12/16/2023. An raba bayanin tsaro don saukewa a huiyao.love. Wannan matsala ana saninta da CVE-2023-6888. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

4 Goyarwa · 72 Datenpunkte

FurɗeSúgá
12/16/2023 09:46
Gargadi 1/3
12/16/2023 09:48
Gargadi 2/3
01/11/2024 19:01
Gargadi 3/3
01/11/2024 19:08
software_vendorPHZ76PHZ76PHZ76PHZ76
software_nameRtspServerRtspServerRtspServerRtspServer
software_version1.0.01.0.01.0.01.0.0
software_fileRtspMesaage.cppRtspMesaage.cppRtspMesaage.cppRtspMesaage.cpp
software_functionParseRequestLineParseRequestLineParseRequestLineParseRequestLine
vulnerability_cweCWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)CWE-121 (Pufferüberlauf)
vulnerability_risk2222
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prNNNN
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttp://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py
source_cveCVE-2023-6888CVE-2023-6888CVE-2023-6888CVE-2023-6888
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1702681200 (12/16/2023)1702681200 (12/16/2023)1702681200 (12/16/2023)1702681200 (12/16/2023)
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auNNNN
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss2_vuldb_basescore7.57.57.57.5
cvss2_vuldb_tempscore6.46.46.46.4
cvss3_vuldb_basescore6.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.7
cvss3_meta_basescore6.36.36.37.5
cvss3_meta_tempscore5.75.75.77.3
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cve_assigned1702681200 (12/16/2023)1702681200 (12/16/2023)
cve_nvd_summaryA vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auN
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore7.5
cvss3_nvd_basescore9.8
cvss3_cna_basescore6.3

Do you need the next level of professionalism?

Upgrade your account now!