Secunia: Luigi Auriemma has reported a vulnerability in PeerCast, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the "handshakeHTTP()" function. This can be exploited to cause a heap-based buffer overflow via a specially crafted "SOURCE" HTTP request.
Sound, please advise.
Sound, please bump this ebuild or apply patches.
*** Bug 203083 has been marked as a duplicate of this bug. ***
*peercast-0.1218 (10 Jan 2008) 10 Jan 2008; Robert Buchholz <rbu@gentoo.org> +peercast-0.1218.ebuild: Version bump for Security, fixing a Heap-based buffer overflow (CVE-2007-6454, bug #202747) Arches, please test and mark stable media-sound/peercast-0.1218. Target keywords : "amd64 x86"
amd64 stable ;-)
x86 stable, last one so update the whiteboard
(In reply to comment #6) > x86 stable, last one so update the whiteboard > thanks, request filed.
GLSA 200801-22