<style class="ke-style">
[list-style-type] {padding-left:20px;list-style-position:inside}
[list-style-type] li {margin:0}
[list-style-type] li:before, span.ke-list-item-matter {font-family:"sans serif",tahoma,verdana,helvetica}
[list-style-type] li p,[list-style-type] li h1,[list-style-type] li h2,[list-style-type] li h3,[list-style-type] li h4,[list-style-type] li h5,[list-style-type] li div,[list-style-type] li blockquote{display:inline;word-break:break-all}
[list-style-type] li table {display:inline-block;vertical-align:top}
p{margin:0}
td {word-break: break-word}
.default-font-1774035843927{
}
</style><div class="default-font-1774035843927" dir="ltr"><p style="font-size:14px;"><span data-slate-fragment="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" style="white-space-collapse:preserve;">Dear LIVE555 maintainers,</span></p><p style="font-size:14px;"><br></p><p style="font-size:14px;">I am a software security researcher and I would like to report two potential use-after-free vulnerabilities discovered in the latest version (2026.02.26) of LIVE555.</p><p style="font-size:14px;"><br></p><p style="font-size:14px;"><strong>1. Use-after-free in SocketDescriptor::tcpReadHandler1</strong></p><p style="font-size:14px;"><br></p><p>A use-after-free in the SocketDescriptor::tcpReadHandler1 function (liveMedia/RTPInterface.cpp:536) of LIVE555 (of version 2026.02.26) allows attackers to cause a Denial of Service (DoS) via sending crafted RTSP and HTTP requests to the server.</p><p><br></p><p>The buffer is allocated in the RTSPServer::createNewClientConnection function (liveMedia/RTSPServer.cpp:2022:10) and freed in the RTSPServer::RTSPClientConnection::~RTSPClientConnection function (liveMedia/RTSPServer.cpp:341:59).</p><p style="font-size:14px;"><br></p><p style="font-size:14px;"><strong>2. Use-after-free in RTPInterface::sendDataOverTCP</strong></p><p style="font-size:14px;"><br></p><p>A use-after-free in the RTPInterface::sendDataOverTCP function (liveMedia/RTPInterface.cpp:383) of LIVE555 (of version 2026.02.26) allows attackers to cause a Denial of Service (DoS) via sending crafted RTSP requests to the server.</p><p><br></p><p>The buffer is allocated in the RTSPServer::createNewClientConnection function (liveMedia/RTSPServer.cpp:2022:10) and freed in the RTSPServer::RTSPClientConnection::~RTSPClientConnection function (liveMedia/RTSPServer.cpp:341:59).</p><p style="font-size:14px;"><br></p><p style="font-size:14px;">These two vulnerabilities appear to share the same allocation and deallocation sites. I am not sure whether they stem from the same root cause or should be treated as distinct vulnerabilities.</p><p style="font-size:14px;"><br></p><p class="isSelectedEnd">I have attached a PoC package (live555-poc.zip), which includes the reproduction steps and GDB crash outputs.</p><p style="font-size:14px;"><br></p><p style="font-size:14px;">Best regards,</p><p style="font-size:14px;">Tianyang Liu</p><p style="font-size:14px;"><br></p></div>