No description provided by source.
source: http://www.securityfocus.com/bid/26899/info PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer. Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. These issues affect PeerCast 0.12.17, SVN 334 and prior versions. http://www.exploit-db.com/sploits/30894.zip