Beyond Security Blog

Janus WebRTC Server through 0.10.0 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) Vulnerability

Details

An issue was discovered in janus-gateway (aka Janus WebRTC Server) through 0.10.0. janus_streaming_rtsp_parse_sdp in plugins/janus_streaming.c has a Buffer Overflow via a crafted RTSP server.

Vulnerable Systems:

Janus WebRTC Server through 0.10.0

CVE Information:

CVE-2020-14033

Disclosure Timeline:
Published Date:6/15/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us

By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Reviews