CVE-2026-1109
📋 TL;DR
A buffer overflow vulnerability exists in the rtsp_parse_request function of cijliu librtsp, allowing local attackers to potentially execute arbitrary code or crash the application. This affects systems using vulnerable versions of librtsp, particularly those with local user access. The vulnerability requires local access for exploitation.
💻 Affected Systems
- cijliu librtsp
📦 What is this software?
Librtsp by Cijliu
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise or arbitrary code execution with the privileges of the librtsp process.
Likely Case
Application crash (denial of service) or limited information disclosure due to buffer overflow.
If Mitigated
Minimal impact if proper access controls and process isolation are implemented.
🎯 Exploit Status
Exploitation requires local access and specific conditions to trigger the buffer overflow. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - vendor did not respond
Vendor Advisory: None available
Restart Required: Yes
Instructions:
1. Check if librtsp is installed on your system. 2. Monitor the official repository for updates. 3. Consider alternative RTSP libraries if no patch is forthcoming.
🔧 Temporary Workarounds
Restrict local access
allLimit local user access to systems running librtsp to reduce attack surface.
Run with minimal privileges
linuxEnsure librtsp processes run with the least privileges necessary.
sudo chown -R nonprivilegeduser:nonprivilegedgroup /path/to/librtsp
🧯 If You Can't Patch
- Isolate systems running librtsp from other critical systems
- Implement strict access controls and monitoring for local user activities
🔍 How to Verify
Check if Vulnerable:
Check if librtsp is installed and verify the commit hash is 2ec1a81ad65280568a0c7c16420d7c10fde13b04 or earlier.
Check Version:
git log --oneline -1 (if installed from source) or check package manager for version info
Verify Fix Applied:
Verify the librtsp installation has been updated to a commit after 2ec1a81ad65280568a0c7c16420d7c10fde13b04.
📡 Detection & Monitoring
Log Indicators:
- Application crashes of librtsp processes
- Unusual local process activity involving librtsp
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Process:Name='librtsp' AND EventType='Crash'