Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200506-15] PeerCast: Format string vulnerability


Vulnerability Assessment Details

[GLSA-200506-15] PeerCast: Format string vulnerability

Vulnerability Assessment Summary
PeerCast: Format string vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200506-15
(PeerCast: Format string vulnerability)


James Bercegay of the GulfTech Security Research Team discovered
that PeerCast insecurely implements formatted printing when receiving a
request with a malformed URL.

Impact

A remote attacker could exploit this vulnerability by sending a
request with a specially crafted URL to a PeerCast server to execute
arbitrary code.

Workaround

There is no known workaround at this time.

References:
http://www.gulftech.org/?node=research&article_id=00077-05282005
http://www.peercast.org/forum/viewtopic.php?p=11596


Solution:
All PeerCast users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212"


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors


IBUYPOWER I-SERIES G236A654 | CORE I5-9400F | 256GB | 8GB | WIN10H | REFURBISHED picture

IBUYPOWER I-SERIES G236A654 | CORE I5-9400F | 256GB | 8GB | WIN10H | REFURBISHED

$324.99



i5 GTX 1080 16GB RAM 512GB SSD + 3TB HD Liquid-Cooled Gaming Computer RGB Remote picture

i5 GTX 1080 16GB RAM 512GB SSD + 3TB HD Liquid-Cooled Gaming Computer RGB Remote

$495.00



SGIN 17.3

SGIN 17.3" Laptop 8GB RAM 512GB SSD Celeron Quad-Core Up to 2.6GHz HD 1080P

$229.00



Custom RGB Gaming Desktop PC Intel Core i7 3.40 Quad 32 GB SSD Nvidia RTX 3060 picture

Custom RGB Gaming Desktop PC Intel Core i7 3.40 Quad 32 GB SSD Nvidia RTX 3060

$654.00



Dell Precision 7670, Intel Core i7-12850HX, 32GB RAM 2TB SSD, RTX A2000 8GB picture

Dell Precision 7670, Intel Core i7-12850HX, 32GB RAM 2TB SSD, RTX A2000 8GB

$186.00



Intel Xeon E5-2667 V2 LGA 2011 3.3GHz 8 Core 130W 25MB 8GT/s CPU Processor picture

Intel Xeon E5-2667 V2 LGA 2011 3.3GHz 8 Core 130W 25MB 8GT/s CPU Processor

$11.99



AMD Ryzen 7 5700X3D 8-Core 16-Thread 4.1GHz Socket AM4 CPU picture

AMD Ryzen 7 5700X3D 8-Core 16-Thread 4.1GHz Socket AM4 CPU

$194.99



Lot of 2 Intel Xeon E5-2667 V2 3.3GHz 8 Core 130W 25M 8GT/s CPU Server Processor picture

Lot of 2 Intel Xeon E5-2667 V2 3.3GHz 8 Core 130W 25M 8GT/s CPU Server Processor

$19.99



New HP 24

New HP 24" Touchscreen All In One Computer i3-1115G4 Up To 32GB & 2TB SSD Win 11

$359.99



HP Z8 G4 Workstation 36 Core 2x Gold 6154 64GB RAM No HDD/ GPU/ OS picture

HP Z8 G4 Workstation 36 Core 2x Gold 6154 64GB RAM No HDD/ GPU/ OS

$825.95



Discussions


Warning: mysql_connect(): Too many connections in /home/vscan/public_html/comments.php on line 3

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16

No Discussions have been posted on this vulnerability.