Secunia wrote: Secunia Research has discovered a vulnerability in SHOUTcast, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in DNAS when receiving data from a relay master server. This can be exploited to overflow a static buffer by tricking a SHOUTcast admin into setting up a server to act as relay for a malicious server. Successful exploitation allows to e.g. overwrite the password of the web administration interface. The vulnerability is confirmed in version 1.9.8 for Windows. Other versions may also be affected. SOLUTION: Relay trusted servers only. PROVIDED AND/OR DISCOVERED BY: Stefan Cornelius, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-62/
No upstream fix, secunia suggests relaying trusted servers only. @maintainers: p.mask? I would be okay with an elog warning users about that, but there's a second part to that secunia advisory: 2) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. ban an IP address or subnet if a logged-in administrator visits a malicious web site. This vulnerability is confirmed in version 1.9.8 for Windows and Linux. Other versions may also be affected.
# Aaron Bauman <bman@gentoo.org> (19 Mar 2016) # Unpatched security vulnerability per bug #261182. # Masked for removal in 30 days. media-sound/shoutcast-server-bin media-sound/shoutcast-trans-bin
packages tree cleaned