Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execute arbitrary code. For the stable distribution (etch), this problem has been fixed in version 0.1217.toots.20060314-1etch1. For the unstable distribution (sid), this problem has been fixed in version 0.1218+svn20080104-1.1. We recommend that you upgrade your peercast package.
Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execute arbitrary code.
For the stable distribution (etch), this problem has been fixed in version 0.1217.toots.20060314-1etch4.
For the unstable distribution (sid), this problem has been fixed in version 0.1218+svn20080104-1.1.
We recommend that you upgrade your peercast package.
MD5 checksums of the listed files are available in the original advisory.