Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 85833 - net-misc/icecast: Multiple vulnerabilities
Summary: net-misc/icecast: Multiple vulnerabilities
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.securityfocus.com/archive/...
Whiteboard: B? [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2005-03-18 16:25 UTC by Luke Macken (RETIRED)
Modified: 2005-03-25 05:58 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Luke Macken (RETIRED) gentoo-dev 2005-03-18 16:25:47 UTC
These are tested on IceCast v2.20. This software can be freely obtained from http://www.icecast.org.

"Icecast is a streaming media server which currently supports Ogg 
Vorbis and MP3 audio streams. It can be used to create an Internet 
radio station or a privately running jukebox and many things in 
between. It is very versatile in that new formats can be added 
relatively easily and supports open standards for commuincation and 
interaction."

1) The XSL parser has some unchecked buffers (local), but they dont seem to be exploitable.
If they are, they can be used for priviledge escalation, under the user
that the server runs.

<xsl:when test="<lots of chars>"></xsl:when>
<xsl:if test="<lots of chars>"></xsl:if>
<xsl:value-of select="<lots of chars>" />

2) Cause XSL parser error "Could not parse XSLT file". (Not very useful).

GET /status.xsl> HTTP/1.0
GET /status.xsl< HTTP/1.0
GET /<status.xsl HTTP/1.0

3) XSL parser bypass. (Useful to steal customized XSL files, lol).

GET /auth.xsl. HTTP/1.0
GET /status.xsl. HTTP/1.0
Comment 1 Luke Macken (RETIRED) gentoo-dev 2005-03-18 18:13:09 UTC
None of these issues seem very critical.

Sound, please advise.
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-03-23 06:57:12 UTC
Audit team: unless the (1) is exploitable, I think we can close this one. Opinions ?
Comment 3 Tavis Ormandy (RETIRED) gentoo-dev 2005-03-25 05:54:45 UTC
Definitely not a security issue, you would have to sabotage your own configuration files in order to execute code as yourself.

It's INVALID, imho.
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-03-25 05:58:50 UTC
and I agree