10
CVSSv2

CVE-2007-6454

Published: 20/12/2007 Updated: 15/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and previous versions, and SVN 344 and previous versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.

Vulnerable Product Search on Vulmon Subscribe to Product

peercast peercast 0.1211

peercast peercast 0.1212

peercast peercast

peercast peercast 0.1215

Vendor Advisories

Several remote vulnerabilities have been discovered in GNOME PeerCast, the GNOME interface to PeerCast, a P2P audio and video streaming server The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6454 Luigi Auriemma discovered that PeerCast is vulnerable to a heap overflow in the HTTP server code, w ...
Luigi Auriemma discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a heap overflow in the HTTP server code, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request The old stable distribution (sarge) does not contain peercast For the stable distrib ...

Exploits

source: wwwsecurityfocuscom/bid/26899/info PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user ...