|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200506-15] PeerCast: Format string vulnerability Vulnerability Assessment Details
|
[GLSA-200506-15] PeerCast: Format string vulnerability |
||
PeerCast: Format string vulnerability Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200506-15 (PeerCast: Format string vulnerability) James Bercegay of the GulfTech Security Research Team discovered that PeerCast insecurely implements formatted printing when receiving a request with a malformed URL. Impact A remote attacker could exploit this vulnerability by sending a request with a specially crafted URL to a PeerCast server to execute arbitrary code. Workaround There is no known workaround at this time. References: http://www.gulftech.org/?node=research&article_id=00077-05282005 http://www.peercast.org/forum/viewtopic.php?p=11596 Solution: All PeerCast users should upgrade to the latest available version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
IBUYPOWER I-SERIES G236A654 | CORE I5-9400F | 256GB | 8GB | WIN10H | REFURBISHED
$324.99
i5 GTX 1080 16GB RAM 512GB SSD + 3TB HD Liquid-Cooled Gaming Computer RGB Remote
$495.00
SGIN 17.3" Laptop 8GB RAM 512GB SSD Celeron Quad-Core Up to 2.6GHz HD 1080P
$229.00
Custom RGB Gaming Desktop PC Intel Core i7 3.40 Quad 32 GB SSD Nvidia RTX 3060
$654.00
Dell Precision 7670, Intel Core i7-12850HX, 32GB RAM 2TB SSD, RTX A2000 8GB
$186.00
Intel Xeon E5-2667 V2 LGA 2011 3.3GHz 8 Core 130W 25MB 8GT/s CPU Processor
$11.99
AMD Ryzen 7 5700X3D 8-Core 16-Thread 4.1GHz Socket AM4 CPU
$194.99
Lot of 2 Intel Xeon E5-2667 V2 3.3GHz 8 Core 130W 25M 8GT/s CPU Server Processor
$19.99
New HP 24" Touchscreen All In One Computer i3-1115G4 Up To 32GB & 2TB SSD Win 11
$359.99
HP Z8 G4 Workstation 36 Core 2x Gold 6154 64GB RAM No HDD/ GPU/ OS
$825.95
|
||
Warning: mysql_connect(): Too many connections in /home/vscan/public_html/comments.php on line 3 Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4 Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16 No Discussions have been posted on this vulnerability. |