Fenice OMS Server HTTP RTSP Module parse_url Overflow

ID OSVDB:24881
Type osvdb
Reporter Luigi Auriemma(aluigi@autistici.org)
Modified 2006-04-23T10:47:37


Solution Description

Upgrade to version 1.11 (svn r353 - 2006-06-06) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.


Vendor URL: http://streaming.polito.it/server Secunia Advisory ID:19770 Related OSVDB ID: 24882 Other Advisory URL: http://aluigi.altervista.org/adv/fenicex-adv.txt Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-04/0638.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0527.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0023.html Generic Exploit URL: http://www.milw0rm.com/exploits/3815 FrSIRT Advisory: ADV-2006-1491 CVE-2006-2022 Bugtraq ID: 17678