Feng

Feng

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.74%
  • Veröffentlicht 04.01.2008 00:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in the RTSP_valid_response_msg function in RTSP_state_machine.c in LScube Feng 0.1.15 and earlier allow remote attackers to execute arbitrary code via (1) a long first line of a response, as demonstrated by a long VER line; ...

Exploit
  • EPSS 4.74%
  • Veröffentlicht 04.01.2008 00:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the RTSP_remove_msg function in RTSP_lowlevel.c in LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an RTP packet with a size value of 0xffff.

Exploit
  • EPSS 3.41%
  • Veröffentlicht 04.01.2008 00:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via (1) a malformed Transport header, which triggers misparsing in parse_transport_header in RTSP_setup.c, as demonstrated by a Tr...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 04.01.2008 00:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Interpretation conflict in LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via a User-Agent header line that contains a carriage-return character, which is considered a line deli...

Exploit
  • EPSS 11.12%
  • Veröffentlicht 04.01.2008 00:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Url_init function in utils/url.c in Netembryo 0.0.4, when used by LScube Feng, allows remote attackers to cause a denial of service (NULL dereference and daemon crash) via a malformed URI containing a "/:" sequence, as demonstrated by a "DESCRIBE...