Integer overflow in the RTSP_msg_len function in rtsp/RTSP_msg_len.c in Fenice 1.10 and earlier allows remote attackers to cause a denial of service (application crash) via a large HTTP Content-Length value, which leads to an invalid memory access.
Link | Tags |
---|---|
http://secunia.com/advisories/19770 | vendor advisory third party advisory exploit |
http://www.securityfocus.com/bid/17678 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26080 | vdb entry |
http://aluigi.altervista.org/adv/fenicex-adv.txt | |
http://www.securityfocus.com/archive/1/431870/100/0/threaded | mailing list |
http://securityreason.com/securityalert/794 | third party advisory |
http://www.vupen.com/english/advisories/2006/1491 | vdb entry |
http://www.securityfocus.com/archive/1/436256/100/0/threaded | mailing list |
http://www.osvdb.org/24882 | vdb entry |