An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
The product does not check for an error after calling a function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00029.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202009-05 | third party advisory vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1018 | third party advisory exploit |
https://gitlab.freedesktop.org/gstreamer/gst-rtsp-server/-/commit/44ccca3086dd81081d72ca0b21d0ecdde962fb1a | third party advisory patch |