VID |
27343 |
Severity |
40 |
Port |
7144 |
Protocol |
TCP |
Class |
P2P |
Detailed Description |
The PeerCast HTTP server, according to its banner, has a buffer overflow vulnerability in the handshakeHTTP function. PeerCast is a peer-to-peer (P2P) software package that lets users broadcast streaming media, for Microsoft Windows, Mac OS X and Linux-based operating systems. PeerCast versions prior to 0.1218 could allow an attacker to execute arbitrary code on the affected system, caused due to a heap-based buffer overflow error in the handshakeHTTP function. By sending an overly long "SOURCE" HTTP request to the handshakeHTTP function, a local attacker could execute arbitrary code on the system.
* Note: This check solely relied on the banner of the HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/485199/30/0/threaded http://www.frsirt.com/english/advisories/2007/4246 http://secunia.com/advisories/28120
* Platforms Affected: peercast.org, PeerCast versions prior to 0.1218 Apple Mac OS Any version Linux Any version Microsoft Windows Any version |
Recommendation |
If P2P file sharing program is not allowed at your organization, uninstall the program.
-- OR --
Upgrade to the latest version of PeerCast (0.1218 or later), available from the PeerCast Download Web site at http://www.peercast.org/download.php |
Related URL |
CVE-2007-6454 (CVE) |
Related URL |
26899 (SecurityFocus) |
Related URL |
39075 (ISS) |
|