7.5
CVSSv2

CVE-2006-3124

Published: 26/08/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the HTTP header parsing in Streamripper prior to 1.61.26 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted HTTP headers.

Vulnerable Product Search on Vulmon Subscribe to Product

streamripper streamripper 1.61.24

streamripper streamripper 1.61.25

Vendor Advisories

Ulf Härnhammar from the Debian Security Audit Project discovered that streamripper, a utility to record online radio-streams, performs insufficient sanitising of data received from the streaming server, which might lead to buffer overflows and the execution of arbitrary code For the stable distribution (sarge) this problem has been fixed in versi ...

Exploits

/* * name: streamripper <= 16125 win32 remote exploit * * bug by: Ulf Harnhammar * status: public * exploit: psylocn * payload: portbind 4444 * ********************************************************** * K:\>exploitexe 80 0 * [ public-release ] * streamripper <= 1 ...
/* _______ ________ __ _____ __ ___ __\ _ \ ____ \_____ \ | |__ / | | ____ | | __ \ \/ / /_\ \ / \ _(__ < ______ | | \ / | |__/ ___\| |/ / > <\ \_/ \ | \/ \ /_____/ | Y \/ ^ /\ \___| < /__/\_ \\_____ /___| /______ / ...