Overview
CVE-2025-65406 details a heap overflow vulnerability found in Live555 Streaming Media version 2018.09.02. The vulnerability resides within the MatroskaFile::createRTPSinkForTrackNumber() function. An attacker can exploit this flaw by providing a specially crafted MKV file, potentially leading to a Denial of Service (DoS) condition. This report provides an in-depth analysis of the vulnerability, its potential impact, and available mitigation strategies.
Technical Details
The MatroskaFile::createRTPSinkForTrackNumber() function, responsible for creating an RTP sink for a specific track number within a Matroska (MKV) file, is susceptible to a heap overflow. By crafting a malicious MKV file with oversized or unexpected data related to the track information, an attacker can trigger the function to allocate insufficient memory, resulting in a heap overflow when writing data. This overflow can overwrite adjacent memory regions on the heap, potentially corrupting program data or control flow.
CVSS Analysis
Currently, the CVSS score and severity are listed as N/A. This likely means the vulnerability is newly discovered or still under assessment. However, given the potential for a Denial of Service (DoS) and the potential for further exploitation depending on the overwritten memory, a more detailed CVSS score should be determined as more information becomes available. The CVSS score will depend on factors such as attack complexity, user interaction, and scope.
Possible Impact
The primary impact of this vulnerability is a Denial of Service (DoS). A successful exploit could crash the Live555 Streaming Media application, disrupting media streaming services. The extent of the DoS may vary depending on the system configuration and the nature of the attack. Further analysis might reveal the possibility of Remote Code Execution (RCE) if the heap overflow can be carefully crafted to overwrite crucial program data or function pointers. This would significantly increase the severity of the vulnerability.
Mitigation or Patch Steps
Since the vulnerable version is 2018.09.02, users should upgrade to the latest available version of Live555 Streaming Media. Check the official Live555 website or relevant distribution channels for the latest releases and security patches. Applying appropriate input validation and sanitization to MKV files before processing them with Live555 can also help mitigate the risk, though this is not a substitute for patching.
Specifically, look for updates addressing memory allocation within the MatroskaFile::createRTPSinkForTrackNumber() function.
