Korean
<< Back
VID 27343
Severity 40
Port 7144
Protocol TCP
Class P2P
Detailed Description The PeerCast HTTP server, according to its banner, has a buffer overflow vulnerability in the handshakeHTTP function. PeerCast is a peer-to-peer (P2P) software package that lets users broadcast streaming media, for Microsoft Windows, Mac OS X and Linux-based operating systems. PeerCast versions prior to 0.1218 could allow an attacker to execute arbitrary code on the affected system, caused due to a heap-based buffer overflow error in the handshakeHTTP function. By sending an overly long "SOURCE" HTTP request to the handshakeHTTP function, a local attacker could execute arbitrary code on the system.

* Note: This check solely relied on the banner of the HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/485199/30/0/threaded
http://www.frsirt.com/english/advisories/2007/4246
http://secunia.com/advisories/28120

* Platforms Affected:
peercast.org, PeerCast versions prior to 0.1218
Apple Mac OS Any version
Linux Any version
Microsoft Windows Any version
Recommendation If P2P file sharing program is not allowed at your organization, uninstall the program.

-- OR --

Upgrade to the latest version of PeerCast (0.1218 or later), available from the PeerCast Download Web site at http://www.peercast.org/download.php
Related URL CVE-2007-6454 (CVE)
Related URL 26899 (SecurityFocus)
Related URL 39075 (ISS)