CVE-2015-8271

9.8 CRITICAL

📋 TL;DR

CVE-2015-8271 is a critical remote code execution vulnerability in RTMPDump's AMF3CD_AddProp function. It allows malicious RTMP media servers to execute arbitrary code on client systems when they connect. This affects any application using vulnerable RTMPDump libraries to process RTMP streams.

💻 Affected Systems

Products:
  • RTMPDump
  • Applications using RTMPDump library (libRTMP)
  • Media players/streaming applications with RTMP support
Versions: RTMPDump 2.4 and earlier versions
Operating Systems: Linux, Windows, macOS, BSD variants
Default Config Vulnerable: ⚠️ Yes
Notes: Any application linking against vulnerable RTMPDump libraries is affected, not just the RTMPDump command-line tool.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the vulnerable system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to malware installation, data exfiltration, or system disruption, particularly affecting media streaming clients and applications.

🟢

If Mitigated

Limited impact through network segmentation, application sandboxing, or exploit prevention controls that block the specific memory corruption.

🌐 Internet-Facing: HIGH - RTMP clients often connect to external media servers, making them directly exposed to malicious servers on the internet.
🏢 Internal Only: MEDIUM - Lower risk if RTMP connections are restricted to trusted internal media servers only, though still vulnerable to insider threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the victim to connect to a malicious RTMP server, which can be achieved through social engineering or compromised legitimate servers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: RTMPDump 2.4+ (patched versions after 2015)

Vendor Advisory: http://www.debian.org/security/2017/dsa-3850

Restart Required: Yes

Instructions:

1. Update RTMPDump to version 2.4 or later from official repositories. 2. Rebuild any applications using libRTMP with the updated library. 3. Restart affected services and applications.

🔧 Temporary Workarounds

Network filtering

linux

Block or restrict RTMP connections (TCP port 1935) to trusted media servers only

iptables -A OUTPUT -p tcp --dport 1935 -j DROP
iptables -A OUTPUT -p tcp --dport 1935 -d trusted_server_ip -j ACCEPT

Application sandboxing

linux

Run RTMP clients in restricted containers or sandboxes to limit exploit impact

firejail --net=none rtmpdump
docker run --security-opt="no-new-privileges" rtmp_client

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RTMP clients from sensitive systems
  • Deploy exploit prevention controls (ASLR, DEP, control flow integrity) and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check RTMPDump version: rtmpdump --version | grep -i rtmpdump

Check Version:

rtmpdump --version 2>/dev/null | head -1

Verify Fix Applied:

Verify version is 2.4 or later and check for security patches in package manager: apt-cache policy rtmpdump

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of RTMP clients
  • Suspicious child processes spawned from RTMP applications
  • Memory corruption errors in application logs

Network Indicators:

  • RTMP connections to unknown or suspicious IP addresses
  • Unusual network traffic patterns from RTMP clients

SIEM Query:

source="*rtmp*" AND (event_type="process_crash" OR event_type="malware_detection")

🔗 References

📤 Share & Export