{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6888","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-16T08:41:53.241Z","datePublished":"2023-12-17T01:00:05.578Z","dateUpdated":"2024-10-07T14:54:46.869Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-17T01:00:05.578Z"},"title":"PHZ76 RtspServer RtspMesaage.cpp ParseRequestLine stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"CWE-121 Stack-based Buffer Overflow"}]}],"affected":[{"vendor":"PHZ76","product":"RtspServer","versions":[{"version":"1.0.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in PHZ76 RtspServer 1.0.0. This vulnerability affects the function ParseRequestLine of the file RtspMesaage.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In PHZ76 RtspServer 1.0.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion ParseRequestLine der Datei RtspMesaage.cpp. Dank der Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-12-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-16T09:48:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"hu1y40 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.248248","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.248248","tags":["signature","permissions-required"]},{"url":"http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/","tags":["related"]},{"url":"https://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:42:08.424Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248248","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248248","tags":["signature","permissions-required","x_transferred"]},{"url":"http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/","tags":["related","x_transferred"]},{"url":"https://github.com/hu1y40/PoC/blob/main/rtspserver_stackoverflow_poc.py","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-07T14:54:14.378090Z","id":"CVE-2023-6888","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-07T14:54:46.869Z"}}]}}