7.5
CVSSv2

CVE-2004-1373

Published: 23/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in SHOUTcast 1.9.4 allows remote malicious users to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.

Vulnerable Product Search on Vulmon Subscribe to Product

nullsoft shoutcast server 1.9.4

Exploits

## # $Id: shoutcast_formatrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...
/* Object: PoC for Nullsoft SHOUTcast 194 File Request Format String Vulnerability From the securityfocus bid at wwwsecurityfocuscom/bid/12096 : "This issue was reported to exist in version 194 on Linux It is likely that versions for other platforms are also affected by the vulnerability, though it is not known to what degree they ...
/* SHOUTcast DNAS/Linux v194 format string remote exploit */ /* Damian Put <pucik@cc-teamorg> Cyber-Crime Team (wwwCC-Teamorg) */ /* Tested on slackware 91 and 100 (0xbf3feee0) */ /* When exploit only crash SHOUTcast we should calculate new address: */ /* ...