cve/2007/CVE-2007-6626.md
2024-05-26 14:27:05 +02:00

20 lines
899 B
Markdown

### [CVE-2007-6626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6626)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple buffer overflows in the RTSP_valid_response_msg function in RTSP_state_machine.c in LScube Feng 0.1.15 and earlier allow remote attackers to execute arbitrary code via (1) a long first line of a response, as demonstrated by a long VER line; or (2) a long second line of a response, as demonstrated by a message that follows a RETURN line.
### POC
#### Reference
- http://aluigi.altervista.org/adv/fengulo-adv.txt
- http://aluigi.org/poc/fengulo.zip
- http://securityreason.com/securityalert/3507
#### Github
No PoCs found on GitHub currently.