<div style="font-family: system-ui; font-size: 14px"><div><br></div><div>My name is Sangjun Park, and I am a fuzzing researcher. <br>I have discovered a stack-use-after-return vulnerability in the live555 streaming media server (version 2024-09-29) running on Ubuntu 20.04. <br><br>
The issue occurs when the server processes a sequence of SETUP and other client requests, leading to a stack-use-after-return condition. You can easily reproduce the bug by following the instructions in the attached README.md file. Please note that ASAN must be activated to reproduce the issue in this case.
Additionally, I have attached the ASAN report and a reproducible test case, which can be accessed via the following link: <br><br>https://drive.google.com/file/d/18z4jdK_hbBg5DB7TarwaRC3IJjeLuKnK/view?usp=sharing <br><br>
Best regards, <br>Sangjun Park
</div><!-- begin signature --><!-- end signature --></div><!--[if mso]>
<table style ="display:none"><tr><td><img src="https://kaist.gov-dooray.com/mail-receipts?img=2f674c6d2b697a4d-32e091651d6fe486-364472d782c1bb9e-364472d962235caa.gif" border="0"></td></tr></table>
<![endif]-->
<!--[if !mso]><!-- -->
<table style ="visibility: hidden;"><tr><td><img src="https://kaist.gov-dooray.com/mail-receipts?img=2f674c6d2b697a4d-32e091651d6fe486-364472d782c1bb9e-364472d962235caa.gif" border="0"></td></tr></table>
<!--[endif]-->