Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 96199

Summary: media-sound/peercast: ver.0.1212 contains security fix
Product: Gentoo Security Reporter: Derick Eisenhardt <zephyrxero>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major CC: sound
Priority: High    
Version: unspecified   
Hardware: All   
OS: All   
Whiteboard: B1 [glsa]
Package list:
Runtime testing required: ---

Description Derick Eisenhardt 2005-06-15 11:07:08 UTC
The old version of Peercast was found to have a bug in it that allowed possible
execution of malicious code
(http://www.peercast.org/forum/viewtopic.php?p=11596). Version 0.1212 fixes this
flaw. The current version of Peercast in portage (including masked) is ver.0.1211

Reproducible: Always
Steps to Reproduce:
Comment 1 Jakub Moc (RETIRED) gentoo-dev 2005-06-15 11:15:56 UTC
http://www.gulftech.org/?node=research&article_id=00077-05282005

  Format String Vulnerability In Peercast
	
May 28, 2005
Vendor 	: peercast.org
URL 	: http://www.peercast.org/
Version 	: Peercast 0.1211 And Earlier
Risk 	: Format String Vulnerability


Description:
Peercast is a popular p2p streaming media server (similar to shoutcast). There
is a serious security issue in peercast versions 0.1211 and earlier that may
allow for an attacker to execute arbitrary code on the remote target with the
privileges of the user running peercast (usually administrator) or crash the
vulnerable server. There is an updated version of peercast available and all
users should upgrade as soon as possible.


Format String Vulnerability:
There is a very dangerous format string issue in peercast that may allow for an
attacker to execute arbitrary code on the remote target with the privileges of
the user running peercast or crash the vulnerable server. Below is an example of
how this vulnerability can be exploited to crash a vulnerable server.

http://localhost:7144/html/en/index.htm%n

The problem occurs because of the way some error messages are handled. For
example in the above example the peercast server receives a malformed request,
so the error routine printed the URL, but the error print routine (because it
was a printf type function call) then tries to parse the malicious url.


Solution:
Thanks to Giles from Peercast for fixing this issue fast and releasing a patch
in just a few hours. Now that is a quick turn around!
http://www.peercast.org/forum/viewtopic.php?p=11596

Credits:
James Bercegay of the GulfTech Security Research Team 
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-06-15 12:02:25 UTC
sound: please bump
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-06-19 12:04:17 UTC
sound herd: please bump !
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-06-19 12:08:56 UTC
Oops, sorry, it /was/ bumped :) Ready for GLSA
Comment 5 Thierry Carrez (RETIRED) gentoo-dev 2005-06-19 12:36:30 UTC
GLSA 200506-15