Joined: 12 May 2004
|Posted: Tue Mar 21, 2006 1:26 pm Post subject: [ GLSA 200603-17 ] PeerCast: Buffer overflow
|Gentoo Linux Security Advisory
Title: PeerCast: Buffer overflow (GLSA 200603-17)
Date: March 21, 2006
PeerCast is vulnerable to a buffer overflow that may lead to the execution of arbitrary code.
PeerCast is a Peer to Peer broadcasting technology for listening to radio and watching video on the Internet.
Vulnerable: < 0.1217
Unaffected: >= 0.1217
Architectures: All supported architectures
INFIGO discovered a problem in the URL handling code. Buffers that are allocated on the stack can be overflowed inside of nextCGIarg() function.
By sending a specially crafted request to the HTTP server, a remote attacker can cause a stack overflow, resulting in the execution of arbitrary code.
There is no known workaround at this time.
All PeerCast users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1217"
Last edited by GLSA on Sun May 07, 2006 5:00 pm; edited 1 time in total