7.5
CVSSv2

CVE-2008-2040

Published: 30/04/2008 Updated: 08/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password.

Vulnerable Product Search on Vulmon Subscribe to Product

peercast peercast 0.1218

Vendor Advisories

Several remote vulnerabilities have been discovered in GNOME PeerCast, the GNOME interface to PeerCast, a P2P audio and video streaming server The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-6454 Luigi Auriemma discovered that PeerCast is vulnerable to a heap overflow in the HTTP server code, w ...
Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execute arbitrary code For the stable distribution (etch), this problem has been fixed in version 01217toots20060314-1etch1 For the unstable distr ...

Exploits

source: wwwsecurityfocuscom/bid/28986/info PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user ...