7.8 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.576 Medium
EPSS
Percentile
97.7%
Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.
aluigi.altervista.org/adv/peercasthof-adv.txt
bugs.debian.org/cgi-bin/bugreport.cgi?bug=457300
bugs.gentoo.org/show_bug.cgi?id=202747
secunia.com/advisories/28120
secunia.com/advisories/28260
secunia.com/advisories/28719
secunia.com/advisories/30325
securityreason.com/securityalert/3461
www.debian.org/security/2007/dsa-1441
www.debian.org/security/2008/dsa-1583
www.gentoo.org/security/en/glsa/glsa-200801-22.xml
www.securityfocus.com/archive/1/485199/100/0/threaded
www.securityfocus.com/bid/26899
www.vupen.com/english/advisories/2007/4246
exchange.xforce.ibmcloud.com/vulnerabilities/39075