Fenice <= 1.10 Multiple Remote Vulnerabilities

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote RTSP server suffers from multiple overflow issues.

Description :

The remote host is running Fenice, an open source media streaming
server for Linux / Unix.

The version of Fenice installed on the remote host is affected by an
integer overflow vulnerability involving requests with large values
for the 'Content-Length' header and by a buffer overflow vulnerability
in its 'parse_url' function. An unauthenticated, remote attacker can
exploit either flaw using a simple GET request to crash the affected
application and possibly to execute arbitrary code subject to the
privileges of the user id under which Fenice runs.

See also :

http://www.securityfocus.com/archive/1/431870/30/0/threaded
http://www.securityfocus.com/archive/1/436256/30/0/threaded

Solution :

Upgrade to Fenice version 1.11 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 21610 (fenice_110.nasl)

Bugtraq ID: 17678

CVE ID: CVE-2006-2022
CVE-2006-2023