Buffer overflow in Janus WebRTC Server - CVE-2020-14034

 

Buffer overflow in Janus WebRTC Server - CVE-2020-14034

Published: July 15, 2020


Vulnerability identifier: #VU29935
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2020-14034
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Janus WebRTC Server
Software vendor:
Meetecho

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in "janus_get_codec_from_pt" in the "utils.c" file. A remote attacker can use a specially crafted SDP Offer packet, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links