Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65404: n/a

0
Unknown
VulnerabilityCVE-2025-65404cvecve-2025-65404
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow in the getSideInfo2() function of Live555 Streaming Media v2018.09.02 allows attackers to cause a Denial of Service (DoS) via a crafted MP3 stream.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:20:53 UTC

Technical Analysis

CVE-2025-65404 identifies a buffer overflow vulnerability in the getSideInfo2() function within Live555 Streaming Media version 2018.09.02. Live555 is an open-source media streaming library widely used in various streaming applications and embedded devices. The vulnerability arises when the function processes MP3 streams; a crafted MP3 stream can trigger a buffer overflow, leading to a Denial of Service (DoS) by crashing the application or causing undefined behavior. The flaw does not require user authentication, meaning any entity capable of sending MP3 streams to the vulnerable system can exploit it. Although no known exploits have been reported in the wild, the lack of patches and the nature of the vulnerability make it a significant risk. The absence of a CVSS score limits precise severity quantification, but the potential for service disruption and the ease of triggering the overflow highlight the threat's seriousness. The vulnerability affects all systems using the specified Live555 version, which may include media servers, streaming appliances, and embedded devices in various sectors. Attackers could leverage this to disrupt services, impacting availability and potentially leading to broader operational issues if exploited in critical environments.

Potential Impact

For European organizations, the primary impact is service disruption due to Denial of Service conditions caused by processing malicious MP3 streams. Organizations relying on Live555 for streaming media delivery, including broadcasters, telecom providers, and enterprises using embedded streaming devices, could experience outages or degraded service quality. This could affect customer experience, operational continuity, and potentially lead to financial losses. Critical infrastructure sectors using embedded devices with Live555 may face operational risks if media streaming components are integral to their systems. The vulnerability does not appear to allow code execution or data compromise directly, so confidentiality and integrity impacts are limited. However, availability impacts can be significant, especially in environments where continuous media streaming is essential. The lack of patches increases exposure duration, and the ease of exploitation without authentication raises the risk profile for European entities.

Mitigation Recommendations

European organizations should immediately audit their environments to identify systems running Live555 Streaming Media version 2018.09.02 or similar vulnerable versions. Until patches are available, organizations should implement strict input validation and filtering to block untrusted or suspicious MP3 streams at network boundaries or application layers. Deploying network-level controls such as deep packet inspection (DPI) to detect and block malformed MP3 streams can reduce exposure. Monitoring media streaming services for crashes or abnormal behavior can provide early detection of exploitation attempts. Organizations should engage with vendors or open-source maintainers for updates and apply patches promptly once released. Additionally, segmenting streaming media infrastructure from critical operational networks can limit the impact of potential DoS attacks. Incident response plans should include procedures for handling streaming service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692dbfd095b0bac45939d915

Added to database: 12/1/2025, 4:18:24 PM

Last enriched: 12/1/2025, 4:20:53 PM

Last updated: 12/1/2025, 5:34:14 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats