CVE-2020-6095

An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gst-rtsp-server:1.14.5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

21 Nov 2024, 05:35

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html - Mailing List, Third Party Advisory
References () https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a - Patch, Third Party Advisory () https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/202009-05 - Third Party Advisory () https://security.gentoo.org/glsa/202009-05 - Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018 - Exploit, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018 - Exploit, Third Party Advisory

Information

Published : 2020-03-27 20:15

Updated : 2024-11-21 05:35


NVD link : CVE-2020-6095

Mitre link : CVE-2020-6095

CVE.ORG link : CVE-2020-6095


JSON object : View

Products Affected

opensuse

  • leap
  • backports_sle

gstreamer_project

  • gst-rtsp-server
CWE
CWE-690

Unchecked Return Value to NULL Pointer Dereference

CWE-476

NULL Pointer Dereference