Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 245959 - media-sound/streamripper Multiple Vulnerabilities
Summary: media-sound/streamripper Multiple Vulnerabilities
Status: RESOLVED DUPLICATE of bug 249039
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/32562/
Whiteboard: B2 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-11-07 13:17 UTC by Robert Buchholz (RETIRED)
Modified: 2008-11-27 11:33 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-11-07 13:17:52 UTC
** Please note that this issue is confidential and no information should be
disclosed until it is made public, see "Whiteboard" for a date **

Secunia wrote:
Secunia Research has discovered some vulnerabilities in Streamripper
when parsing certain HTTP responses.

1) A boundary error exists within the function
"http_parse_sc_header()" in lib/http.c when parsing an overly long
HTTP header starting with "Zwitterion v".

2) A boundary error exists within the function "http_get_pls()" in
lib/http.c when parsing a specially crafted pls playlist containing an
overly long entry.

3) A boundary error exists within the function "http_get_m3u() in
lib/http.c when parsing a specially crafted m3u playlist containing an
overly long "File" entry.

The vulnerabilities can be exploited to execute arbitrary code by
tricking a user into connecting to a malicious server. Secunia has
developed exploits, which are available upon request.

Additionally, the "http_parse_url()" function in lib/http.c does not
properly parse URLs with an overly long username, password, or
hostname. However, we do not consider this to be an issue as tricking
a user into executing Streamripper with a malicious URL seems unlikely
(note that there are GUI frontends available which may be leveraged as
less obvious attack vectors).

The vulnerabilities are confirmed in version 1.63.5. Other versions
may also be affected.

Disclosure date: Preliminary disclosure date set to Wednesday, November
19th 2008.
SAID: SA32562 - http://secunia.com/advisories/32562/
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-11-27 11:33:01 UTC
public, but we have a new bug.

*** This bug has been marked as a duplicate of bug 249039 ***