Summary: | media-sound/shoutcast-server-bin DNAS Relay Server Buffer Overflow Vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | sound |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/33467/ | ||
Whiteboard: | B1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() No upstream fix, secunia suggests relaying trusted servers only. @maintainers: p.mask? I would be okay with an elog warning users about that, but there's a second part to that secunia advisory: 2) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. ban an IP address or subnet if a logged-in administrator visits a malicious web site. This vulnerability is confirmed in version 1.9.8 for Windows and Linux. Other versions may also be affected. # Aaron Bauman <bman@gentoo.org> (19 Mar 2016) # Unpatched security vulnerability per bug #261182. # Masked for removal in 30 days. media-sound/shoutcast-server-bin media-sound/shoutcast-trans-bin packages tree cleaned |