Lucene search

K
gentooGentoo FoundationGLSA-200801-22
HistoryJan 30, 2008 - 12:00 a.m.

PeerCast: Buffer overflow

2008-01-3000:00:00
Gentoo Foundation
security.gentoo.org
12

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.576 Medium

EPSS

Percentile

97.7%

Background

PeerCast is a client and server for P2P-radio network

Description

Luigi Auriemma reported a heap-based buffer overflow within the “handshakeHTTP()” function when processing HTTP requests.

Impact

A remote attacker could send a specially crafted request to the vulnerable server, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the PeerCast server, usually “nobody”.

Workaround

There is no known workaround at this time.

Resolution

All PeerCast users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-sound/peercast< 0.1218UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.576 Medium

EPSS

Percentile

97.7%