GLSA Bodhisattva
Joined: 25 Feb 2003 Posts: 3829 Location: Essen, Germany
|
Posted: Wed Jan 05, 2005 3:34 pm Post subject: [ GLSA 200501-04 ] Shoutcast Server: Remote code execution |
|
|
Gentoo Linux Security Advisory
Title: Shoutcast Server: Remote code execution (GLSA 200501-04)
Severity: normal
Exploitable: remote
Date: January 05, 2005
Updated: May 22, 2006
Bug(s): #75482
ID: 200501-04
Synopsis
Shoutcast Server contains a possible buffer overflow that could lead to the execution of arbitrary code.
Background
Shoutcast Server is Nullsoft's streaming audio server. It runs on a variety of platforms, including Linux, and is extremely popular with Internet broadcasters.
Affected Packages
Package: media-sound/shoutcast-server-bin
Vulnerable: <= 1.9.4-r1
Unaffected: >= 1.9.5
Architectures: All supported architectures
Description
Part of the Shoutcast Server Linux binary has been found to improperly handle sprintf() parsing.
Impact
A malicious attacker could send a formatted URL request to the Shoutcast Server. This formatted URL would cause either the server process to crash, or the execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Shoutcast Server users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.5" |
References
BugTraq Announcement
CVE-2004-1373
Last edited by GLSA on Mon May 22, 2006 4:18 am; edited 2 times in total |
|