NULL Pointer Dereference Affecting rtmpdump package, versions <2.4+20151223.gitfa8646d-1ubuntu0.1
Threat Intelligence
EPSS
0.16% (53rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1604-RTMPDUMP-290058
- published 13 Apr 2017
- disclosed 13 Apr 2017
Introduced: 13 Apr 2017
CVE-2015-8272 Open this link in a new tabHow to fix?
Upgrade Ubuntu:16.04 rtmpdump to version 2.4+20151223.gitfa8646d-1ubuntu0.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream rtmpdump package and not the rtmpdump package as distributed by Ubuntu.
See How to fix? for Ubuntu:16.04 relevant fixed versions and status.
RTMPDump 2.4 allows remote attackers to trigger a denial of service (NULL pointer dereference and process crash).