Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3616 liblivemedia security update 21 November 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: liblivemedia Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-4013 Reference: ESB-2018.3325 Original Bulletin: https://lists.debian.org/debian-lts-announce/2018/11/msg00020.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : liblivemedia Version : 2014.01.13-1+deb8u1 CVE ID : CVE-2018-4013 A stack based buffer overflow vulnerability was found in liblivemedia, the LIVE555 RTSP server library. This issue might be leveraged by remote attackers to cause code execution, by sending a crafted packet. For Debian 8 "Jessie", this problem has been fixed in version 2014.01.13-1+deb8u1. We recommend that you upgrade your liblivemedia packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEUFZhdgIWqBhwqCvuZYVUZx9w0DQFAlv0ehsACgkQZYVUZx9w 0DRt1Af/UYgC0k1JxyfW838Q+qEutCcobOuQwSWb3fMa57uFTzDtX696M/F52dq+ piVcGrRFW7khT9movCYy0jvRs65ujb7MqNqRdIyw4q7PShqaR4CfTmCE7JbekGYM /u3XqKQNHXEcyt5OSLvehA4mIO6rVl4FkSSE8aafAyjyk6CgtlTYHO9FUlpnrAeK nqZpiXy4CG4iIp2lCg4eicpPFcOTzoPzgRaGEXBrNAQIusOwn/AMKZW14oRVIK6E MketkrjT/DItOyi9/VdUyXsUZXfZx7l2lrkSPJIUD8mxUPTIn+3vLw/OlgkupH1t Ov2U8QpbI/eS2ZSdIWCJMPtoxpc1/Q== =c3Um - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW/SsimaOgq3Tt24GAQhJEg/+NYFuc/biEXy8sH5b90p0XYvMlPA9fCm8 Sv/aQ2jBVcKk1nZY73OvaOu5Cs3oja3vKwe5D6WkHL0vfB/+LUjn4bs2JGx179cv pk/4FqdF0+TOl2Cms9KsKYYdZRxthMLdKadTX7yWWMNR2miaSjs7Uzwkxf3PjT/m YfHmsPs2JzUXw2Nntgff7TnaHIxmgjSIznmpXw/mFNYtLxxAEuaqLi+nJfWUCdCh uNcvvwcczZN9Ou9enic85NQ0X7nOUkMmE0mm2zN+30UX0cv2JlLC/8l+7d/zcvnB sdwjJGSzu1a0bpGxtE32zCSYvX5udL2OXGKYVLQxejxqbT6bxoeLDCSTtNok5WbF 6HGdFJLjyOD6mUC9EnxGuLDXBcRoMhjSkLUccbAk8p4dIg5iQPzdBFlgSGxe7cjd YFqpmZSLo03z5cNG49DSOjxOtF/4YM15egXHn7cE/o8ffdTb5RsUPCLzLpbqQEse hwVoGoexHb2B4SaJ7IYT+jhMKp4LKJZnTMj6LeMXmGmZBBf4Tucrqaj6XrAdAUyr lJETW1x+FAxwvw2k1/UPSQW6H8zu1ZrvKACyA7wpThPjCxESMT2P8eRHwCWOpKXz Y4uNKG3WMvnb0ki03j2IsSPM1cIeRn/Nv0msnLI3LmH0yQBuX2B70N9uPLjupnf5 rfnskN/zUb0= =olJ5 -----END PGP SIGNATURE-----