VID |
27341 |
Severity |
40 |
Port |
7144 |
Protocol |
TCP |
Class |
P2P |
Detailed Description |
The PeerCast HTTP server, according to its banner, has a buffer overflow vulnerability. PeerCast is a peer-to-peer (P2P) software package that lets users broadcast streaming media, for Microsoft Windows, Mac OS X and Linux-based operating systems. PeerCast version 0.1215 and earlier versions could allow a remote attacker to execute arbitrary code on the affected system, caused due to a stack-based buffer overflow error within the handling of the parameters received in an URL. By sending a specially crafted request for a malformed URL to port 7144, a remote attacker could execute arbitrary code on the system.
* Note: This check solely relied on the banner of the HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.peercast.org/forum/viewtopic.php?t=3346 http://www.infigo.hr/in_focus/INFIGO-2006-03-01 http://www.securityfocus.com/archive/1/427160/30/0/threaded http://secunia.com/advisories/19169/
* Platforms Affected: peercast.org, PeerCast version 0.1215 and earlier versions Apple Mac OS Any version Linux Any version Microsoft Windows Any version |
Recommendation |
If P2P file sharing program is not allowed at your organization, uninstall the program.
-- OR --
Upgrade to the latest version of PeerCast (0.1217 or later), available from the PeerCast Download Web site at http://www.peercast.org/download.php |
Related URL |
CVE-2006-1148 (CVE) |
Related URL |
17040 (SecurityFocus) |
Related URL |
25113 (ISS) |
|