SHOUTcast filename format string vulnerability

2006-05-17T00:00:00
ID SAINT:05B8700F627DB5CCF4B6F3C1AF17C761
Type saint
Reporter SAINT Corporation
Modified 2006-05-17T00:00:00

Description

Added: 05/17/2006
CVE: CVE-2004-1373
BID: 12096
OSVDB: 12585

Background

SHOUTcast is a streaming audio server based on Winamp.

Problem

A format string vulnerability in SHOUTcast allows remote attackers to execute commands by requesting a MP3 filename containing format string characters such as **%n**.

Resolution

Upgrade to SHOUTcast 1.9.5 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2004-12/0366.html>

Limitations

Exploit works on SHOUTcast 1.9.4. The exploit may fail on servers using Security Enhanced Linux.

Platforms

Windows 2000
Windows XP
Linux