Xiaobo,
Many thanks for reporting this. The problem was not the call to “sscanf()”
(because the buffer being read into is guaranteed to be large enough), but the
subsequent call to “sprintf()” (using a fixed buffer size of 100).
I have now installed a new version (2020.07.09) of the “LIVE555 S
[summary]
In the latest version of live555 mediaserver, there is a stack based buffer
overflow vulnerability when parsing 'PLAY' command.
An attacker is able to send a sequence of malformed RTSP packets to trigger
this issue. In the worst case, the media server running this service can be
exploite