PeerCast < 0.1217 procConnectArgs Function Remote Overflow

High Nessus Network Monitor Plugin ID 3468

Synopsis

The remote web server suffers from a buffer overflow vulnerability.

Description

The version of PeerCast installed on the remote host copies the supplied option string without limit into a finite-size buffer. An unauthenticated attacker can leverage this issue to crash the affected application and possibly to execute arbitrary code on the remote host subject to the privileges of the user running PeerCast.

Solution

Upgrade to version 0.1217 or higher.

See Also

http://www.securityfocus.com/archive/1/427160/30/0/threaded

http://www.peercast.org/forum/viewtopic.php?t=3346

Plugin Details

Severity: High

ID: 3468

File Name: 3468.prm

Family: Web Servers

Published: 2006/03/09

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 21041

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

Core Impact

Metasploit (PeerCast <= 0.1216 URL Handling Buffer Overflow (linux))

Reference Information

CVE: CVE-2006-1148

BID: 17040