PeerCast: Buffer overflow — GLSA 200801-22

A buffer overflow vulnerability has been discovered in PeerCast.

Affected packages

media-sound/peercast on all architectures
Affected versions < 0.1218
Unaffected versions >= 0.1218

Background

PeerCast is a client and server for P2P-radio network

Description

Luigi Auriemma reported a heap-based buffer overflow within the "handshakeHTTP()" function when processing HTTP requests.

Impact

A remote attacker could send a specially crafted request to the vulnerable server, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the PeerCast server, usually "nobody".

Workaround

There is no known workaround at this time.

Resolution

All PeerCast users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218"

References

Release date
January 30, 2008

Latest revision
January 30, 2008: 02

Severity
high

Exploitable
remote

Bugzilla entries