Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65406: n/a

0
Medium
VulnerabilityCVE-2025-65406cvecve-2025-65406
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A heap overflow in the MatroskaFile::createRTPSinkForTrackNumber() function of Live555 Streaming Media v2018.09.02 allows attackers to cause a Denial of Service (DoS) via supplying a crafted MKV file.

AI-Powered Analysis

AILast updated: 12/08/2025, 18:10:43 UTC

Technical Analysis

CVE-2025-65406 is a heap overflow vulnerability identified in the Live555 Streaming Media library version 2018.09.02, specifically within the MatroskaFile::createRTPSinkForTrackNumber() function. This function is responsible for creating RTP sinks for specific track numbers when processing Matroska (MKV) media files. The vulnerability arises from improper handling of crafted MKV files, which can cause a heap overflow condition. When exploited, this overflow can lead to a Denial of Service (DoS) by crashing the application or causing it to hang, thereby impacting the availability of the streaming service or device using the library. The vulnerability does not require any privileges (AV:N) but does require user interaction (UI:R), meaning the victim must open or process the malicious MKV file. The CVSS vector indicates no impact on confidentiality or integrity, only availability (A:H). No known exploits have been reported in the wild, and no patches have been released yet, which suggests that organizations should proactively monitor and prepare for remediation. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and critical class of memory corruption bugs that can lead to crashes or potentially more severe exploitation if combined with other vulnerabilities. Live555 is widely used in streaming media applications, embedded devices, and IoT products that handle RTP streaming and MKV files, making this vulnerability relevant to a broad range of systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-65406 is service disruption due to Denial of Service attacks. Organizations relying on Live555 for streaming media delivery, video conferencing, or embedded multimedia processing could experience outages or degraded service availability. This can affect telecommunications providers, media companies, broadcasters, and any enterprise using embedded devices that process MKV files. The lack of confidentiality or integrity impact limits data breach risks, but operational continuity could be compromised, leading to potential financial losses and reputational damage. Critical infrastructure sectors that depend on real-time media streaming, such as emergency services or transportation systems, may face operational risks if devices or services become unavailable. The requirement for user interaction means social engineering or phishing campaigns could be used to deliver malicious MKV files, increasing the attack surface. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes public knowledge.

Mitigation Recommendations

1. Implement strict validation and sanitization of all MKV files before processing, using whitelisting or sandboxing techniques to isolate the media parsing components. 2. Restrict user ability to open or process untrusted MKV files, especially in environments where Live555 is used. 3. Monitor streaming media services and embedded devices for abnormal crashes or hangs that could indicate exploitation attempts. 4. Prepare to apply patches or updates from Live555 maintainers as soon as they become available; track vendor advisories closely. 5. Employ network-level protections such as intrusion detection systems (IDS) tuned to detect malformed MKV file traffic or unusual RTP stream behavior. 6. Educate users and administrators about the risks of opening untrusted media files and implement policies to limit exposure. 7. For embedded devices, consider firmware updates or configuration changes that limit exposure to crafted MKV files. 8. Conduct regular security assessments and penetration testing focused on media handling components to identify similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692dca5195b0bac459490639

Added to database: 12/1/2025, 5:03:13 PM

Last enriched: 12/8/2025, 6:10:43 PM

Last updated: 1/15/2026, 10:55:13 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats