Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Live555: live555: remote code execution via segmentation fault in increasebufferto function | Remote code execution via segmentation fault in increasebufferto function |
Wed, 18 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in the rgaufman/live555 fork of live555. A remote attacker could exploit a segmentation fault, in the `increaseBufferTo` function. This vulnerability can lead to memory corruption problems and potentially other consequences. |
| Title | live555: live555: Remote Code Execution via segmentation fault in increaseBufferTo function | Live555: live555: remote code execution via segmentation fault in increasebufferto function |
| References |
|
Tue, 20 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | live555: live555: Remote Code Execution via segmentation fault in increaseBufferTo function | |
| Weaknesses | CWE-824 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-02-18T20:32:58.277Z
Reserved: 2026-01-19T14:14:43.363Z
Link: CVE-2026-1200
Updated: 2026-02-18T20:32:48.643Z
Status : Awaiting Analysis
Published: 2026-02-18T21:16:23.070
Modified: 2026-02-19T15:53:02.850
Link: CVE-2026-1200
OpenCVE Enrichment
No data.