Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> PeerCast Buffer Overflow Vulnerability

Vulnerability Assessment Details

PeerCast Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Tries to crash PeerCast web server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server suffers from a buffer overflow vulnerability.

Description :

The version of PeerCast installed on the remote host copies the
supplied option string without limit into a finite-size buffer. An
unauthenticated attacker can leverage this issue to crash the affected
application and possibly to execute arbitrary code on the remote host
subject to the rights of the user running PeerCast.

See also :

Solution :

Upgrade to PeerCast version 0.1217 or later.

Network Security Threat Level:

High / CVSS Base Score : 7

Networks Security ID: 17040

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Apple Macbook Air 11.6" A1370 - 1.6GHz i5 2GB RAM 64GB SSD - Mint Condition
Apple Macbook Air 11.62GB(2x1) RAM DDR2 Samsung
2GB(2x1) RAM DDR2 Samsung pictureNuVision 8" Signature Edition 32GB/2GB RAM FOR PARTS REPLACEMENT PARTS
NuVision 8Asus ZenPad C7 Tablet 7" 1GB RAM 16GB 1.2GHz Black FOR PARTS REPLACEMENT PARTS
Asus ZenPad C7 Tablet 7


No Discussions have been posted on this vulnerability.