Vulnerabilities
Vulnerable Software
Peercast:  Security Vulnerabilities
Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password.
CVSS Score
7.5
EPSS Score
0.333
Published
2008-04-30
Heap-based buffer overflow in the handshakeHTTP function in servhs.cpp in PeerCast 0.1217 and earlier, and SVN 344 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long SOURCE request.
CVSS Score
10.0
EPSS Score
0.25
Published
2007-12-20
Peercast places a cleartext password in a query string, which might allow attackers to obtain sensitive information by sniffing the network, or obtaining Referer or browser history information.
CVSS Score
7.8
EPSS Score
0.003
Published
2007-06-06
Multiple stack-based buffer overflows in the procConnectArgs function in servmgr.cpp in PeerCast before 0.1217 allow remote attackers to execute arbitrary code via an HTTP GET request with a long (1) parameter name or (2) value in a URL, which triggers the overflow in the nextCGIarg function in servhs.cpp.
CVSS Score
7.5
EPSS Score
0.817
Published
2006-03-10
Format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code via format strings in the URL.
CVSS Score
7.5
EPSS Score
0.182
Published
2005-05-28


Contact Us

Shodan ® - All rights reserved