CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
70.2%
An issue was discovered in janus-gateway (aka Janus WebRTC Server) through
0.10.0. janus_streaming_rtsp_parse_sdp in plugins/janus_streaming.c has a
Buffer Overflow via a crafted RTSP server.
github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6117
github.com/meetecho/janus-gateway/blob/v0.10.0/plugins/janus_streaming.c#L6166
github.com/meetecho/janus-gateway/commit/dacb4edfad8e77f73b64d8c175cca0a7796ebf80
github.com/meetecho/janus-gateway/pull/2229
launchpad.net/bugs/cve/CVE-2020-14033
nvd.nist.gov/vuln/detail/CVE-2020-14033
security-tracker.debian.org/tracker/CVE-2020-14033
www.cve.org/CVERecord?id=CVE-2020-14033
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
70.2%