Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> PeerCast Buffer Overflow Vulnerability


Vulnerability Assessment Details

PeerCast Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Tries to crash PeerCast web server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server suffers from a buffer overflow vulnerability.

Description :

The version of PeerCast installed on the remote host copies the
supplied option string without limit into a finite-size buffer. An
unauthenticated attacker can leverage this issue to crash the affected
application and possibly to execute arbitrary code on the remote host
subject to the rights of the user running PeerCast.

See also :

http://www.securityfocus.com/archive/1/427160/30/0/threaded
http://www.peercast.org/forum/viewtopic.php?t=3346

Solution :

Upgrade to PeerCast version 0.1217 or later.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 17040

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Apple Macbook Air 11.6" A1370 - 1.6GHz i5 2GB RAM 64GB SSD - Mint Condition
$459.0
Apple Macbook Air 11.62GB(2x1) RAM DDR2 Samsung
$15.0
2GB(2x1) RAM DDR2 Samsung pictureNuVision 8" Signature Edition 32GB/2GB RAM FOR PARTS REPLACEMENT PARTS
$20.0
NuVision 8Asus ZenPad C7 Tablet 7" 1GB RAM 16GB 1.2GHz Black FOR PARTS REPLACEMENT PARTS
$20.0
Asus ZenPad C7 Tablet 7


Discussions

No Discussions have been posted on this vulnerability.