[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1583 gnome-peercast -- buffer overflow

ID: oval:org.mitre.oval:def:8122Date: (C)2009-12-15   (M)2021-06-02
Class: PATCHFamily: unix




Several remote vulnerabilities have been discovered in GNOME PeerCast, the GNOME interface to PeerCast, a P2P audio and video streaming server. The Common Vulnerabilities and Exposures project identifies the following problems: Luigi Auriemma discovered that PeerCast is vulnerable to a heap overflow in the HTTP server code, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request. Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execute arbitrary code.

Platform:
Debian 4.0
Product:
gnome-peercast
Reference:
DSA-1583
CVE-2007-6454
CVE-2008-2040
CVE    2
CVE-2007-6454
CVE-2008-2040
CPE    1
cpe:/o:debian:debian_linux:4.x

© SecPod Technologies