GLSA-200609-01 : Streamripper: Multiple remote buffer overflows

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200609-01
(Streamripper: Multiple remote buffer overflows)

Ulf Harnhammar, from the Debian Security Audit Project, has found that
Streamripper is vulnerable to multiple stack based buffer overflows
caused by improper bounds checking when processing malformed HTTP
headers.

Impact :

By enticing a user to connect to a malicious server, an attacker could
execute arbitrary code with the permissions of the user running
Streamripper

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200609-01.xml

Solution :

All Streamripper users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-sound/streamripper-1.61.26'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 22323 (gentoo_GLSA-200609-01.nasl)

Bugtraq ID:

CVE ID: CVE-2006-3124