|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> PeerCast Format String Vulnerability Vulnerability Assessment Details
|
PeerCast Format String Vulnerability |
||
Checks for format string vulnerability in PeerCast Detailed Explanation for this Vulnerability Assessment Summary : The remote peer-to-peer application is affected by a format string vulnerability. Description : The remote host is running PeerCast, a peer-to-peer software package that lets users broadcast streaming media. The version installed on the remote host suffers from a format string vulnerability. A possible hacker can issue requests containing format specifiers that will crash the server and potentially permit arbitrary code execution subject to rights of the user under which the affected application runs. See also : http://www.gulftech.org/?node=research&article_id=00077-05282005 http://archives.neohapsis.com/archives/bugtraq/2005-05/0335.html http://www.peercast.org/forum/viewtopic.php?p=11596 Solution : Upgrade to PeerCast 0.1212 or newer. Network Security Threat Level: Critical / CVSS Base Score : 10 (AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N) Networks Security ID: 13808 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |