> > In RTSPClientConnection::handleRequestBytes, if a pointer wraparound
> > as checked at line 793 happens, parseSucceeded is set to false but
> > contentLength is still used to perform memmove at line 890.
> > 
> > This might lead to invalid memory access.
> 
> Yes, this is a problem.  I have just installed a new version (2019.05.12) of 
> the code that should prevent this from happening.

Thanks!

> > This is a memory leak. Memory allocated in parseAuthorizationHeader for
> > username, realm, etc. by strDup is never freed.
> 
> Actually, this is not a memory leak.  The parameters to 
> “parseAuthorizationHeader()” are reference parameters (to pointers).  The 
> allocated memory is passed back to the calling function, which ends up 
> deleting them all.  So, there’s no bug here.

OK. I will ask for CVE rejection then. Too bad people keep asking for CVE
numbers without getting in touch with upstream before.

regards,
Hugo

-- 
                Hugo Lefeuvre (hle)    |    www.owl.eu.com
RSA4096_ 360B 03B3 BF27 4F4D 7A3F D5E8 14AA 1EB8 A247 3DFD
ed25519_ 37B2 6D38 0B25 B8A2 6B9F 3A65 A36F 5357 5F2D DC4C

Attachment: signature.asc
Description: PGP signature

_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to