7.5
CVSSv2

CVE-2004-1561

Published: 31/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 768
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Icecast 2.0.1 and previous versions allows remote malicious users to execute arbitrary code via an HTTP request with a large number of headers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

icecast icecast 2.0

icecast icecast 2.0.1

Exploits

## # $Id: icecast_headerrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class M ...
/* by Luigi Auriemma Shellcode add-on by Delikon wwwDelikonde Because of all the forbidden bytes in a http get request i had to use a very small shellcode, which was blown up by Msf::Encoder::PexAlphaNum Great encoder ------------------------------------------------------------------------- C:>iceexec 127001 Icecast <= 20 ...
/* ICECAST 201 WiN32 REMOTE EXPLOiT by Luigi Auriemma Modded by: ************************** ******* LORDKAOZ ********* *** OF IMPERATORI TEAM *** ************************** Greetz to marc0z, m3nTe, DarKBad, OuT, FaX (Anche se non se lo merita), MeSSiA e eXpLoIt! This exploit will add an Administrator account with USER: X AND PASSWORD: X */ ...

Github Repositories

Deploy & hack into a Windows machine, exploiting a very poorly secured media server.

TryHackMe-ice-Walkthrough Deploy & hack into a Windows machine, exploiting a very poorly secured media server Download VPN File from Release Section : Link: githubcom/Sumit-CyberSecurity/TryHackMe-ice-Walkthrough/releases/download/ice/sumit5011ovpn 🔴 Important : Please rename this VPN file as per your TryHackMe account username Task 1 Connect Click on

Notes from SweetRice RCE vulnerability and "Lazy admin" CTF.

CVE-2004-1561 Exploitation notes Hello everyone, I'm sharing with you my notes of exploitation SweetRice I praticed this on this Lab How to open my notes I saved my notes in ctd extension, and opening it in plaintext is chaotic You need to have specialized note-taking software in order to open this properly One of many is CherryTree After you open my notes with this s

Icecast Header Overwrite buffer overflow RCE < 2.0.1 (Win32)

CVE-2004-1561 Icecast Header Overwrite buffer overflow RCE &lt; 201 (Win32) Python 3 Icecast Header Overwrite buffer overflow RCE &lt; 201 (Win32), rewritten from this Metasploit module I rewrote this from the Metasploit module because I couldn't get this to work Usage: Replace reverse shell shellcode in exploit, call it with argument for remote server and po

Python version of Metasploit exploit for CVE-2004-1561

CVE-2004-1561 Python version of Metasploit exploit for CVE-2004-1561

Non-metasploit version of CVE-2004-1561 Alternative to C version Developed for TryHackme : Ice

My notes for CVE-2004-1561 IceCast exploitation

CVE-2004-1561 Exploitation notes Hello everyone, I'm sharing with you my notes of exploitation CVE-2004-1561 of Icecast on Windows 7 machine If you want to try it on your own here's a great lab How to open my notes I saved my notes in ctd extension, and opening it in plaintext is chaotic You need to have specialized note-taking software in order to open this proper

My notes for CVE-2004-1561 IceCast exploitation

CVE-2004-1561 Exploitation notes Hello everyone, I'm sharing with you my notes of exploitation CVE-2004-1561 of Icecast on Windows 7 machine If you want to try it on your own here's a great lab How to open my notes I saved my notes in ctd extension, and opening it in plaintext is chaotic You need to have specialized note-taking software in order to open this proper

My notes for CVE-2004-1561 IceCast exploitation

CVE-2004-1561 Exploitation notes Hello everyone, I'm sharing with you my notes of exploitation CVE-2004-1561 of Icecast on Windows 7 machine If you want to try it on your own here's a great lab How to open my notes I saved my notes in ctd extension, and opening it in plaintext is chaotic You need to have specialized note-taking software in order to open this proper

Máquina: Ice Tryhackme: Ice Lo primero que haremos, será lanzar un NMAP para ver qué puertos tiene abiertos la máquina: En la imagen anterior podemos ver varios puertos abiertos, los más interesantes a primera vista podrían ser: Puerto 445: Servicio SMB Puerto 3389: Servicio RDP Puerto 8000: Servidor Icecast streaming media server

Collection of scripts

scripts-collection This is a repository for all the scripts I'll find useful while I'm learning scripting with Bash, PowerShell and Python icecastpy (CVE-2004-1561) The original script is available here: githubcom/ivanitlearning/CVE-2004-1561/blob/master/icecastpy I had to modify it to make it work for Python3 I modified lines 49 and 50 to fix bytes concat