Lucene search

K
archlinuxArch LinuxASA-201504-12
HistoryApr 11, 2015 - 12:00 a.m.

icecast: denial of service

2015-04-1100:00:00
Arch Linux
lists.archlinux.org
18

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.039 Low

EPSS

Percentile

91.0%

CVE-2015-3026 (denial of service):

The bug can only be triggered if "stream_auth" is being used.
This means, that all installations that use a default configuration are
NOT affected.The default configuration only uses <source-password>.
Neither are simple mountpoints affected that use <password>.
A workaround, if installing an updated package is not possible, is to
disable "stream_auth"and use <password> instead.
As far as we understand the bug only leads to a simple remote denial of
service. The underlying issue is a null pointer dereference. For
clarity: No remote code execution should be possible, server just
segfaults.

OSVersionArchitecturePackageVersionFilename
anyanyanyicecast< 2.4.2-1UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.039 Low

EPSS

Percentile

91.0%