Joined: 25 Feb 2003
Location: Essen, Germany
|Posted: Wed Jan 05, 2005 3:34 pm Post subject: [ GLSA 200501-04 ] Shoutcast Server: Remote code execution
|Gentoo Linux Security Advisory
Title: Shoutcast Server: Remote code execution (GLSA 200501-04)
Date: January 05, 2005
Updated: May 22, 2006
Shoutcast Server contains a possible buffer overflow that could lead to the execution of arbitrary code.
Shoutcast Server is Nullsoft's streaming audio server. It runs on a variety of platforms, including Linux, and is extremely popular with Internet broadcasters.
Vulnerable: <= 1.9.4-r1
Unaffected: >= 1.9.5
Architectures: All supported architectures
Part of the Shoutcast Server Linux binary has been found to improperly handle sprintf() parsing.
A malicious attacker could send a formatted URL request to the Shoutcast Server. This formatted URL would cause either the server process to crash, or the execution of arbitrary code.
There is no known workaround at this time.
All Shoutcast Server users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.5"
Last edited by GLSA on Mon May 22, 2006 4:18 am; edited 2 times in total