Languages

About the security content of Darwin Streaming Server 5.5.5

This article has been archived and is no longer updated by Apple.

This document describes the security content of Darwin Streaming Server 5.5.5. Darwin Streaming Server is an open source project available via:
(http://developer.apple.com/opensource/server/streaming/index.html).

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

Darwin Streaming Server 5.5.5

  • Darwin Streaming Server

    CVE-ID: CVE-2007-0749

    Impact: A remote attacker may be able to cause an unexpected application termination or arbitrary code execution

    Description: A stack buffer overflow exists in the Darwin Streaming Proxy. By sending maliciously-crafted RTSP requests, a remote attacker can trigger the overflow, which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of RTSP requests. Credit to an anonymous researcher working with the iDefense VCP for reporting this issue.

  • Darwin Streaming Server

    CVE-ID: CVE-2007-0748

    Impact: A remote attacker may be able to cause an unexpected application termination or arbitrary code execution

    Description: A heap buffer overflow exists in the Darwin Streaming Proxy. By sending maliciously-crafted RTSP requests, a remote attacker can trigger the overflow, which may lead to an unexpected application termination or arbitrary code execution. This update addresses the issue by performing additional validation of RTSP requests. Credit to an anonymous researcher working with the iDefense VCP for reporting this issue.

Last Modified: Feb 20, 2012

Additional Product Support Information