An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html | Mailing List Third Party Advisory |
https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202009-05 | Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018 | Exploit Third Party Advisory |
Configurations
History
12 May 2022, 17:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
|
References | (GENTOO) https://security.gentoo.org/glsa/202009-05 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html - Mailing List, Third Party Advisory |
Information
Published : 2020-03-27 20:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-6095
Mitre link : CVE-2020-6095
CVE.ORG link : CVE-2020-6095
JSON object : View
Products Affected
gstreamer_project
- gst-rtsp-server
opensuse
- backports_sle
- leap