Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> ICECast libshout remote buffer overflow


Vulnerability Assessment Details

ICECast libshout remote buffer overflow

Vulnerability Assessment Summary
Check icecast version

Detailed Explanation for this Vulnerability Assessment

The remote server runs a version of ICECast, an open source
streaming audio server, which is older than version 1.3.9.

Icecast and the libshout library are affected by a remote buffer overflow because they do
not properly check bounds of data send from clients.

As a result of this vulnerability, it is possible for a remote attacker to
cause a stack overflow and then execute arbitrary code with the privilege of the server.

*** Nessus reports this vulnerability using only
*** information that was gathered.

Solution : Upgrade to a newer version.
Network Security Threat Level: High

Networks Security ID: 4735

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

HP P410i Raid Controller 462919-001 w/ 512MB card 462975-001 and cable
$24.99
HP P410i Raid Controller 462919-001 w/ 512MB card 462975-001 and cable picturePROMISE STEX8650 PCI Express SATA / SAS RAID Controller Card
$165.0
PROMISE STEX8650 PCI Express SATA / SAS RAID Controller Card pictureADAPTEC ASR-5805 512MB TCA-00275-05-D 8x PCI-E 8-PORT SAS/SATA RAID CARD FH
$48.0
ADAPTEC ASR-5805 512MB TCA-00275-05-D 8x PCI-E 8-PORT SAS/SATA RAID CARD FH pictureHP Smart Array P212 SAS/SATA RAID PCIe 256MB Cache 462594-001
$19.99
HP Smart Array P212 SAS/SATA RAID PCIe 256MB Cache 462594-001 picture


Discussions

No Discussions have been posted on this vulnerability.