CVE-2026-1108

5.3 MEDIUM

📋 TL;DR

A buffer overflow vulnerability exists in the rtsp_rely_dumps function of cijliu librtsp, allowing local attackers to potentially execute arbitrary code or crash the application. This affects all versions up to commit 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The vendor has not responded to disclosure attempts.

💻 Affected Systems

Products:
  • cijliu librtsp
Versions: All versions up to commit 2ec1a81ad65280568a0c7c16420d7c10fde13b04
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Rolling release model means no specific version numbers; vulnerability exists in all builds before the fix commit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise via arbitrary code execution.

🟠

Likely Case

Application crash (denial of service) or limited data corruption.

🟢

If Mitigated

Minimal impact if proper access controls and sandboxing prevent local attacker access.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access; buffer overflow exploitation typically requires specific conditions and skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Monitor vendor repository for security updates. 2. Apply patch when available. 3. Rebuild and redeploy librtsp. 4. Restart dependent services.

🔧 Temporary Workarounds

Disable vulnerable function

all

Modify code to avoid calling rtsp_rely_dumps function if possible.

# Requires source code modification; no standard command

Apply memory protection

linux

Enable ASLR and stack protection on systems using librtsp.

echo 2 > /proc/sys/kernel/randomize_va_space
gcc -fstack-protector-all -o program program.c

🧯 If You Can't Patch

  • Restrict local access to systems running vulnerable librtsp.
  • Monitor for abnormal process behavior or crashes.

🔍 How to Verify

Check if Vulnerable:

Check librtsp git commit hash; if earlier than 2ec1a81ad65280568a0c7c16420d7c10fde13b04, vulnerable.

Check Version:

git log --oneline -1 | grep -o '[0-9a-f]\{40\}'

Verify Fix Applied:

Verify commit hash is newer than 2ec1a81ad65280568a0c7c16420d7c10fde13b04.

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault logs
  • Abnormal termination of processes using librtsp

Network Indicators:

  • None - local vulnerability

SIEM Query:

process.name: "*librtsp*" AND event.type: "crash"

🔗 References

📤 Share & Export