Multiple buffer overflows in lib/http.c in Streamripper 1.63.5 allow remote attackers to execute arbitrary code via (1) a long "Zwitterion v" HTTP header, related to the http_parse_sc_header function; (2) a crafted pls playlist with a long entry, related to the http_get_pls function; or (3) a crafted m3u playlist with a long File entry, related to the http_get_m3u function.
References
Configurations
History
21 Nov 2024, 00:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32562 - Vendor Advisory | |
References | () http://secunia.com/advisories/33052 - | |
References | () http://secunia.com/advisories/33061 - | |
References | () http://secunia.com/secunia_research/2008-50/ - | |
References | () http://securityreason.com/securityalert/4647 - | |
References | () http://www.debian.org/security/2008/dsa-1683 - | |
References | () http://www.osvdb.org/49997 - | |
References | () http://www.securityfocus.com/archive/1/498486/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/32356 - | |
References | () http://www.vupen.com/english/advisories/2008/3207 - |
Information
Published : 2008-11-25 23:30
Updated : 2024-11-21 00:52
NVD link : CVE-2008-4829
Mitre link : CVE-2008-4829
CVE.ORG link : CVE-2008-4829
JSON object : View
Products Affected
streamripper
- streamripper
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer