| VID |
27343 |
| Severity |
40 |
| Port |
7144 |
| Protocol |
TCP |
| Class |
P2P |
| Detailed Description |
The PeerCast HTTP server, according to its banner, has a buffer overflow vulnerability in the handshakeHTTP function. PeerCast is a peer-to-peer (P2P) software package that lets users broadcast streaming media, for Microsoft Windows, Mac OS X and Linux-based operating systems. PeerCast versions prior to 0.1218 could allow an attacker to execute arbitrary code on the affected system, caused due to a heap-based buffer overflow error in the handshakeHTTP function. By sending an overly long "SOURCE" HTTP request to the handshakeHTTP function, a local attacker could execute arbitrary code on the system.
* Note: This check solely relied on the banner of the HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/485199/30/0/threaded http://www.frsirt.com/english/advisories/2007/4246 http://secunia.com/advisories/28120
* Platforms Affected: peercast.org, PeerCast versions prior to 0.1218 Apple Mac OS Any version Linux Any version Microsoft Windows Any version |
| Recommendation |
If P2P file sharing program is not allowed at your organization, uninstall the program.
-- OR --
Upgrade to the latest version of PeerCast (0.1218 or later), available from the PeerCast Download Web site at http://www.peercast.org/download.php |
| Related URL |
CVE-2007-6454 (CVE) |
| Related URL |
26899 (SecurityFocus) |
| Related URL |
39075 (ISS) |
|