PeerCast < 0.1217 procConnectArgs Function Remote Overflow

High Nessus Network Monitor Plugin ID 3468


The remote web server suffers from a buffer overflow vulnerability.


The version of PeerCast installed on the remote host copies the supplied option string without limit into a finite-size buffer. An unauthenticated attacker can leverage this issue to crash the affected application and possibly to execute arbitrary code on the remote host subject to the privileges of the user running PeerCast.


Upgrade to version 0.1217 or higher.

See Also

Plugin Details

Severity: High

ID: 3468

File Name: 3468.prm

Family: Web Servers

Published: 2006/03/09

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 21041

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 6.8


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

Core Impact

Metasploit (PeerCast <= 0.1216 URL Handling Buffer Overflow (linux))

Reference Information

CVE: CVE-2006-1148

BID: 17040