Lucene search

K
saintSAINT CorporationSAINT:320B1F4A872D0040471733E8D3A7911D
HistoryMay 17, 2006 - 12:00 a.m.

SHOUTcast filename format string vulnerability

2006-05-1700:00:00
SAINT Corporation
my.saintcorporation.com
20

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.8%

Added: 05/17/2006
CVE: CVE-2004-1373
BID: 12096
OSVDB: 12585

Background

SHOUTcast is a streaming audio server based on Winamp.

Problem

A format string vulnerability in SHOUTcast allows remote attackers to execute commands by requesting a MP3 filename containing format string characters such as **%n**.

Resolution

Upgrade to SHOUTcast 1.9.5 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2004-12/0366.html&gt;

Limitations

Exploit works on SHOUTcast 1.9.4. The exploit may fail on servers using Security Enhanced Linux.

Platforms

Windows 2000
Windows XP
Linux

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.8%