Luigi Auriemma has reported a vulnerability in PeerCast, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "handshakeHTTP()" function. This can be exploited to cause a heap-based buffer overflow via a specially crafted "SOURCE" HTTP request.
Sound, please advise.
Sound, please bump this ebuild or apply patches.
*** Bug 203083 has been marked as a duplicate of this bug. ***
*peercast-0.1218 (10 Jan 2008)
10 Jan 2008; Robert Buchholz <email@example.com> +peercast-0.1218.ebuild:
Version bump for Security, fixing a Heap-based buffer overflow
(CVE-2007-6454, bug #202747)
Arches, please test and mark stable media-sound/peercast-0.1218.
Target keywords : "amd64 x86"
amd64 stable ;-)
x86 stable, last one so update the whiteboard
(In reply to comment #6)
> x86 stable, last one so update the whiteboard
thanks, request filed.