ID OPENVAS:60585 Type openvas Reporter Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com Modified 2017-07-07T00:00:00
Description
The remote host is missing updates announced in
advisory GLSA 200803-22.
# OpenVAS Vulnerability Test
# $
# Description: Auto generated from Gentoo's XML based advisory
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisories, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "A Denial of Service vulnerability has been reported in LIVE555 Media
Server.";
tag_solution = "All LIVE555 Media Server users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-plugins/live-2008.02.08'
Note: Due to ABI changes, applications built against LIVE555 Media Server
such as VLC or MPlayer should also be rebuilt.
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200803-22
http://bugs.gentoo.org/show_bug.cgi?id=204065";
tag_summary = "The remote host is missing updates announced in
advisory GLSA 200803-22.";
if(description)
{
script_id(60585);
script_version("$Revision: 6596 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
script_cve_id("CVE-2007-6036");
script_tag(name:"cvss_base", value:"7.1");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:C");
script_name("Gentoo Security Advisory GLSA 200803-22 (live)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com");
script_family("Gentoo Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-gentoo.inc");
res = "";
report = "";
if ((res = ispkgvuln(pkg:"media-plugins/live", unaffected: make_list("ge 2008.02.08"), vulnerable: make_list("lt 2008.02.08"))) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:60585", "type": "openvas", "bulletinFamily": "scanner", "title": "Gentoo Security Advisory GLSA 200803-22 (live)", "description": "The remote host is missing updates announced in\nadvisory GLSA 200803-22.", "published": "2008-09-24T00:00:00", "modified": "2017-07-07T00:00:00", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=60585", "reporter": "Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com", "references": [], "cvelist": ["CVE-2007-6036"], "lastseen": "2017-07-24T12:49:55", "viewCount": 2, "enchantments": {"score": {"value": 7.2, "vector": "NONE", "modified": "2017-07-24T12:49:55", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-6036"]}, {"type": "exploitdb", "idList": ["EDB-ID:30776"]}, {"type": "nessus", "idList": ["GENTOO_GLSA-200803-22.NASL", "FREEBSD_PKG_821AFAA29E9A11DCA7E30016360406FA.NASL"]}, {"type": "gentoo", "idList": ["GLSA-200803-22"]}, {"type": "osvdb", "idList": ["OSVDB:39489"]}, {"type": "freebsd", "idList": ["821AFAA2-9E9A-11DC-A7E3-0016360406FA"]}, {"type": "openvas", "idList": ["OPENVAS:59977"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:8358"]}], "modified": "2017-07-24T12:49:55", "rev": 2}, "vulnersScore": 7.2}, "pluginID": "60585", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A Denial of Service vulnerability has been reported in LIVE555 Media\nServer.\";\ntag_solution = \"All LIVE555 Media Server users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-plugins/live-2008.02.08'\n\nNote: Due to ABI changes, applications built against LIVE555 Media Server\nsuch as VLC or MPlayer should also be rebuilt.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200803-22\nhttp://bugs.gentoo.org/show_bug.cgi?id=204065\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200803-22.\";\n\n \n\nif(description)\n{\n script_id(60585);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2007-6036\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_name(\"Gentoo Security Advisory GLSA 200803-22 (live)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"media-plugins/live\", unaffected: make_list(\"ge 2008.02.08\"), vulnerable: make_list(\"lt 2008.02.08\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Gentoo Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T05:31:28", "description": "The parseRTSPRequestString function in LIVE555 Media Server 2007.11.01 and earlier allows remote attackers to cause a denial of service (daemon crash) via a short RTSP query, which causes a negative number to be used during memory allocation.", "edition": 6, "cvss3": {}, "published": "2007-11-20T11:46:00", "title": "CVE-2007-6036", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-6036"], "modified": "2018-10-15T21:49:00", "cpe": ["cpe:/a:live555:media_server:2007.11.01"], "id": "CVE-2007-6036", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6036", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:live555:media_server:2007.11.01:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:35", "bulletinFamily": "software", "cvelist": ["CVE-2007-6036"], "description": "## Vulnerability Description\nLIVE555 Media Server> contains a flaw that may allow a remote denial of service. The issue is triggered due to improper validation of user-supplied input by the parseRTSPRequestString() function occurs, and will result in loss of availability for the server.\n## Solution Description\nUpgrade to version 2007.11.18 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nLIVE555 Media Server parseRTSPRequestString() RTSP Query Remote DoS\n## References:\nVendor URL: http://www.live555.com/mediaServer\nVendor Specific News/Changelog Entry: http://www.live555.com/liveMedia/public/changelog.txt</a>\nVendor Specific News/Changelog Entry: http://www.live555.com/liveMedia/public/changelog.txt\n[Secunia Advisory ID:27711](https://secuniaresearch.flexerasoftware.com/advisories/27711/)\nOther Advisory URL: http://aluigi.altervista.org/adv/live555x-adv.txt\nMail List Post: http://www.securityfocus.com/archive/1/archive/1/483910/100/0/threaded\nISS X-Force ID: 38542\nFrSIRT Advisory: ADV-2007-3939\n[CVE-2007-6036](https://vulners.com/cve/CVE-2007-6036)\nBugtraq ID: 26488\n", "edition": 1, "modified": "2007-11-18T00:00:00", "published": "2007-11-18T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:39489", "id": "OSVDB:39489", "title": "LIVE555 Media Server parseRTSPRequestString() RTSP Query Remote DoS", "type": "osvdb", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-02T21:10:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-6036"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-22T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:59977", "href": "http://plugins.openvas.org/nasl.php?oid=59977", "type": "openvas", "title": "FreeBSD Ports: liveMedia", "sourceData": "#\n#VID 821afaa2-9e9a-11dc-a7e3-0016360406fa\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: liveMedia\n\nCVE-2007-6036\nThe parseRTSPRequestString function in LIVE555 Media Server 2007.11.01\nand earlier allows remote attackers to cause a denial of service\n(daemon crash) via a short RTSP query, which causes a negative number\nto be used during memory allocation.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://aluigi.altervista.org/adv/live555x-adv.txt\nhttp://www.live555.com/liveMedia/public/changelog.txt\nhttp://www.vuxml.org/freebsd/821afaa2-9e9a-11dc-a7e3-0016360406fa.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(59977);\n script_version(\"$Revision: 4128 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-22 07:37:51 +0200 (Thu, 22 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2007-6036\");\n script_tag(name:\"cvss_base\", value:\"7.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_name(\"FreeBSD Ports: liveMedia\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"liveMedia\");\nif(!isnull(bver) && revcomp(a:bver, b:\"2007.11.18,1\")<0) {\n txt += 'Package liveMedia version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:30", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6036"], "description": "\nThe live555 development team reports:\n\nFixed a bounds-checking error in \"parseRTSPRequestString()\"\n\t caused by an int vs. unsigned problem.\n\n\nThe function which handles the incoming queries from the\n\t clients is affected by a vulnerability which allows an attacker\n\t to crash the server remotely using the smallest RTSP query\n\t possible to use.\n\n", "edition": 4, "modified": "2007-12-09T00:00:00", "published": "2007-11-20T00:00:00", "id": "821AFAA2-9E9A-11DC-A7E3-0016360406FA", "href": "https://vuxml.freebsd.org/freebsd/821afaa2-9e9a-11dc-a7e3-0016360406fa.html", "title": "liveMedia -- DoS vulnerability", "type": "freebsd", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "exploitdb": [{"lastseen": "2016-02-03T13:06:04", "description": "LIVE555 Media Server 2007.11.1 ParseRTSPRequestString Remote Denial Of Service Vulnerability. CVE-2007-6036. Dos exploit for linux platform", "published": "2007-11-19T00:00:00", "type": "exploitdb", "title": "LIVE555 Media Server 2007.11.1 ParseRTSPRequestString Remote Denial Of Service Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2007-6036"], "modified": "2007-11-19T00:00:00", "id": "EDB-ID:30776", "href": "https://www.exploit-db.com/exploits/30776/", "sourceData": "source: http://www.securityfocus.com/bid/26488/info\r\n\r\nLIVE555 Media Server is prone to a remote denial-of-service vulnerability because it fails to adequately sanitize user-supplied input.\r\n\r\nAttackers can exploit this issue to crash the application, resulting in denial-of-service conditions.\r\n\r\nLIVE555 Media Server 2007.11.01 is vulnerable; other versions may also be affected. \r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/30776.zip", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/30776/"}], "nessus": [{"lastseen": "2021-01-07T10:46:37", "description": "The live555 development team reports :\n\nFixed a bounds-checking error in 'parseRTSPRequestString()' caused by\nan int vs. unsigned problem.\n\nThe function which handles the incoming queries from the clients is\naffected by a vulnerability which allows an attacker to crash the\nserver remotely using the smallest RTSP query possible to use.", "edition": 25, "published": "2007-12-11T00:00:00", "title": "FreeBSD : liveMedia -- DoS vulnerability (821afaa2-9e9a-11dc-a7e3-0016360406fa)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-6036"], "modified": "2007-12-11T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:liveMedia"], "id": "FREEBSD_PKG_821AFAA29E9A11DCA7E30016360406FA.NASL", "href": "https://www.tenable.com/plugins/nessus/29289", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29289);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-6036\");\n\n script_name(english:\"FreeBSD : liveMedia -- DoS vulnerability (821afaa2-9e9a-11dc-a7e3-0016360406fa)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The live555 development team reports :\n\nFixed a bounds-checking error in 'parseRTSPRequestString()' caused by\nan int vs. unsigned problem.\n\nThe function which handles the incoming queries from the clients is\naffected by a vulnerability which allows an attacker to crash the\nserver remotely using the smallest RTSP query possible to use.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aluigi.altervista.org/adv/live555x-adv.txt\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.live555.com/liveMedia/public/changelog.txt\"\n );\n # https://vuxml.freebsd.org/freebsd/821afaa2-9e9a-11dc-a7e3-0016360406fa.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c730a497\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:liveMedia\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/11/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"liveMedia<2007.11.18,1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-07T10:52:20", "description": "The remote host is affected by the vulnerability described in GLSA-200803-22\n(LIVE555 Media Server: Denial of Service)\n\n Luigi Auriemma reported a signedness error in the\n parseRTSPRequestString() function when processing short RTSP queries.\n \nImpact :\n\n A remote attacker could send a specially crafted RTSP query to the\n vulnerable server, resulting in a crash.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "published": "2008-03-17T00:00:00", "title": "GLSA-200803-22 : LIVE555 Media Server: Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-6036"], "modified": "2008-03-17T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:live", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200803-22.NASL", "href": "https://www.tenable.com/plugins/nessus/31593", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200803-22.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(31593);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-6036\");\n script_xref(name:\"GLSA\", value:\"200803-22\");\n\n script_name(english:\"GLSA-200803-22 : LIVE555 Media Server: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200803-22\n(LIVE555 Media Server: Denial of Service)\n\n Luigi Auriemma reported a signedness error in the\n parseRTSPRequestString() function when processing short RTSP queries.\n \nImpact :\n\n A remote attacker could send a specially crafted RTSP query to the\n vulnerable server, resulting in a crash.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200803-22\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All LIVE555 Media Server users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-plugins/live-2008.02.08'\n Note: Due to ABI changes, applications built against LIVE555 Media\n Server such as VLC or MPlayer should also be rebuilt.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C\");\n script_cwe_id(20);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:live\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/03/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-plugins/live\", unaffected:make_list(\"ge 2008.02.08\"), vulnerable:make_list(\"lt 2008.02.08\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"LIVE555 Media Server\");\n}\n", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:27", "bulletinFamily": "software", "cvelist": ["CVE-2007-6036"], "description": "Uninitialized memory reading on RTSP query processing.", "edition": 1, "modified": "2007-11-19T00:00:00", "published": "2007-11-19T00:00:00", "id": "SECURITYVULNS:VULN:8358", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8358", "title": "LIVE555 media server DoS", "type": "securityvulns", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:01", "bulletinFamily": "unix", "cvelist": ["CVE-2007-6036"], "description": "### Background\n\nLIVE555 Media Server is a set of libraries for multimedia streaming. \n\n### Description\n\nLuigi Auriemma reported a signedness error in the parseRTSPRequestString() function when processing short RTSP queries. \n\n### Impact\n\nA remote attacker could send a specially crafted RTSP query to the vulnerable server, resulting in a crash. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll LIVE555 Media Server users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-plugins/live-2008.02.08\"\n\nNote: Due to ABI changes, applications built against LIVE555 Media Server such as VLC or MPlayer should also be rebuilt.", "edition": 1, "modified": "2008-03-13T00:00:00", "published": "2008-03-13T00:00:00", "id": "GLSA-200803-22", "href": "https://security.gentoo.org/glsa/200803-22", "type": "gentoo", "title": "LIVE555 Media Server: Denial of Service", "cvss": {"score": 7.1, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}