|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Misc. >> ICECast libshout remote buffer overflow Vulnerability Assessment Details
|
ICECast libshout remote buffer overflow |
||
Check icecast version Detailed Explanation for this Vulnerability Assessment The remote server runs a version of ICECast, an open source streaming audio server, which is older than version 1.3.9. Icecast and the libshout library are affected by a remote buffer overflow because they do not properly check bounds of data send from clients. As a result of this vulnerability, it is possible for a remote attacker to cause a stack overflow and then execute arbitrary code with the privilege of the server. *** Nessus reports this vulnerability using only *** information that was gathered. Solution : Upgrade to a newer version. Network Security Threat Level: High Networks Security ID: 4735 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |