CVE-2015-3026 (denial of service):
The bug can only be triggered if "stream_auth" is being used.
This means, that all installations that use a default configuration are
NOT affected.The default configuration only uses <source-password>.
Neither are simple mountpoints affected that use <password>.
A workaround, if installing an updated package is not possible, is to
disable "stream_auth"and use <password> instead.
As far as we understand the bug only leads to a simple remote denial of
service. The underlying issue is a null pointer dereference. For
clarity: No remote code execution should be possible, server just
segfaults.
lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html
seclists.org/oss-sec/2015/q2/78
seclists.org/oss-sec/2015/q2/80
bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3026
trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server
trac.xiph.org/ticket/2191