PHZ76 RtspServer 1.0.0 RtspMesaage.cpp ParseRequestLine ବଫର୍ ଓଭରଫ୍ଲୋ

Dogoggorri kan akka ଜଟିଳ jedhamuun ramadame PHZ76 RtspServer 1.0.0 keessatti argameera. Miidhaan irra gahe is hojii ParseRequestLine faayilii RtspMesaage.cpp keessa. Dhugumatti jijjiirraa gara ବଫର୍ ଓଭରଫ୍ଲୋ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-121 si geessa. Beekumsi kun yeroo 12/16/2023 ifoomsifameera. Odeeffannoon kun buufachuuf huiyao.love irratti dhiyaateera. Dogoggorri kun maqaa CVE-2023-6888 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Once again VulDB remains the best source for vulnerability data.

4 ଆଡାପ୍ଟେସନ୍ · 72 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
12/16/2023 09:46 AM
ଅଦ୍ୟତନ 1/3
12/16/2023 09:48 AM
ଅଦ୍ୟତନ 2/3
01/11/2024 07:01 PM
ଅଦ୍ୟତନ 3/3
01/11/2024 07:08 PM
software_vendorPHZ76PHZ76PHZ76PHZ76
software_nameRtspServerRtspServerRtspServerRtspServer
software_version1.0.01.0.01.0.01.0.0
software_fileRtspMesaage.cppRtspMesaage.cppRtspMesaage.cppRtspMesaage.cpp
software_functionParseRequestLineParseRequestLineParseRequestLineParseRequestLine
vulnerability_cweCWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)CWE-121 (ବଫର୍ ଓଭରଫ୍ଲୋ)
vulnerability_risk2222
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prNNNN
cvss3_vuldb_uiRRRR
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttp://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.pyhttps://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py
source_cveCVE-2023-6888CVE-2023-6888CVE-2023-6888CVE-2023-6888
cna_responsibleVulDBVulDBVulDBVulDB
advisory_date1702681200 (12/16/2023)1702681200 (12/16/2023)1702681200 (12/16/2023)1702681200 (12/16/2023)
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auNNNN
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss2_vuldb_basescore7.57.57.57.5
cvss2_vuldb_tempscore6.46.46.46.4
cvss3_vuldb_basescore6.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.7
cvss3_meta_basescore6.36.36.37.5
cvss3_meta_tempscore5.75.75.77.3
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cve_assigned1702681200 (12/16/2023)1702681200 (12/16/2023)
cve_nvd_summaryA vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auN
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore7.5
cvss3_nvd_basescore9.8
cvss3_cna_basescore6.3

Do you need the next level of professionalism?

Upgrade your account now!