Vulnerability CVE-2008-4829


Published: 2008-11-25   Modified: 2012-02-12

Description:
Multiple buffer overflows in lib/http.c in Streamripper 1.63.5 allow remote attackers to execute arbitrary code via (1) a long "Zwitterion v" HTTP header, related to the http_parse_sc_header function; (2) a crafted pls playlist with a long entry, related to the http_get_pls function; or (3) a crafted m3u playlist with a long File entry, related to the http_get_m3u function.

See advisories in our WLB2 database:
Topic
Author
Date
High
Streamripper Multiple Buffer Overflows
Secunia Research
20.11.2008

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Streamripper
Product: Streamripper 
Version: 1.63.5;

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://securityreason.com/securityalert/4647
http://www.debian.org/security/2008/dsa-1683
http://www.securityfocus.com/archive/1/498486/100/0/threaded
http://www.securityfocus.com/bid/32356
http://www.vupen.com/english/advisories/2008/3207

Copyright 2019, cxsecurity.com

 

Back to Top