[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2040

Date: (C)2008-04-30   (M)2017-08-08
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password.

Reference:
BID-28986
SECUNIA-29962
SECUNIA-30020
SECUNIA-30320
SECUNIA-30325
SECUNIA-31182
ADV-2008-1409
ADV-2008-1410
DSA-1582
DSA-1583
GLSA-200807-11
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680
peercast-httpgetauthuserpass-bo(42092)

CWE    1
CWE-119
OVAL    2
oval:org.mitre.oval:def:8122
oval:org.mitre.oval:def:8195

© 2013 SecPod Technologies