Vulnerabilities > CVE-2007-0749 - Unspecified vulnerability in Apple Darwin Streaming Server
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN apple
nessus
Summary
Multiple stack-based buffer overflows in the is_command function in proxy.c in Apple Darwin Streaming Proxy, when using Darwin Streaming Server before 5.5.5, allow remote attackers to execute arbitrary code via a long (1) cmd or (2) server value in an RTSP request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 | |
OS | 4 |
Nessus
NASL family | Gain a shell remotely |
NASL id | DARWIN_STREAMING_SERVER_555.NASL |
description | According to its banner, the version of Apple Darwin Streaming Server running on the remote host is prior to version 5.5.5. It is, therefore, affected by multiple vulnerabilities : - A heap buffer overflow condition exists in the Apple Darwin Streaming Proxy that allows an unauthenticated, remote attacker, via multiple trackID values in a SETUP RTSP request, to cause application termination or the execution arbitrary code. (CVE-2007-0748) - Multiple stack-based buffer overflow conditions exist in the is_command() function within file proxy.c due to improper bounds checking. An unauthenticated, remote attacker can exploit these, via a long command or server value in an RTSP request, to cause application termination or the execution arbitrary code. (CVE-2007-0749) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25214 |
published | 2007-05-14 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25214 |
title | Darwin Streaming Server < 5.5.5 Multiple RCE Vulnerabilities |
code |
|
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=533
- http://docs.info.apple.com/article.html?artnum=305495
- http://lists.apple.com/archives/Security-announce/2007/May/msg00002.html
- http://www.securityfocus.com/bid/23918
- http://secunia.com/advisories/25193
- http://www.securitytracker.com/id?1018047
- http://osvdb.org/35976
- http://www.vupen.com/english/advisories/2007/1770
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34222