Buffer overflow in Janus WebRTC Server - CVE-2020-14033

 

Buffer overflow in Janus WebRTC Server - CVE-2020-14033

Published: July 15, 2020


Vulnerability identifier: #VU29934
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-14033
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Janus WebRTC Server
Software vendor:
Meetecho

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in "janus_streaming_rtsp_parse_sdp" in the "plugins/janus_streaming.c" file. A remote attacker can use a specially crafted RTSP server, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links