RTMPDump: Multiple vulnerabilities — GLSA 201702-02

Multiple vulnerabilities have been found in RTMPDump, the worst of which could lead to arbitrary code execution.

Affected packages

media-video/rtmpdump on all architectures
Affected versions < 2.4_p20161210
Unaffected versions >= 2.4_p20161210

Background

RTMPDump is an RTMP client intended to stream audio or video flash content

Description

Multiple vulnerabilities have been discovered in RTMPDump.

The following is a list of vulnerabilities fixed:

  • Additional decode input size checks
  • Ignore zero-length packets
  • Potential integer overflow in RTMPPacket_Alloc().
  • Obsolete RTMPPacket_Free() call left over from original C++ to C rewrite
  • AMFProp_GetObject must make sure the prop is actually an object

Impact

A remote attacker could entice a user to open a specially crafted media flash file using RTMPDump. This could possibly result in the execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All RTMPDump users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=media-video/rtmpdump-2.4_p20161210"
 

References

Release date
February 06, 2017

Latest revision
February 06, 2017: 1

Severity
normal

Exploitable
remote

Bugzilla entries