CVE-2015-3026

Icecast before 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mount=/test.ogg."
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html Third Party Advisory
http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html Vendor Advisory
http://www.debian.org/security/2015/dsa-3239 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/08/11 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/08/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/73965
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120 Issue Tracking
https://security.gentoo.org/glsa/201508-03
https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server Issue Tracking
https://trac.xiph.org/ticket/2191 Exploit Issue Tracking
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html Third Party Advisory
http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html Vendor Advisory
http://www.debian.org/security/2015/dsa-3239 Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/08/11 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/04/08/8 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/73965
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120 Issue Tracking
https://security.gentoo.org/glsa/201508-03
https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server Issue Tracking
https://trac.xiph.org/ticket/2191 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:xiph:icecast:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:28

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html -
References () http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html - Third Party Advisory
References () http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html - Vendor Advisory () http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3239 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3239 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/04/08/11 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/04/08/11 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/04/08/8 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/04/08/8 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/73965 - () http://www.securityfocus.com/bid/73965 -
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120 - Issue Tracking () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120 - Issue Tracking
References () https://security.gentoo.org/glsa/201508-03 - () https://security.gentoo.org/glsa/201508-03 -
References () https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server - Issue Tracking () https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server - Issue Tracking
References () https://trac.xiph.org/ticket/2191 - Exploit, Issue Tracking () https://trac.xiph.org/ticket/2191 - Exploit, Issue Tracking

Information

Published : 2015-04-29 20:59

Updated : 2024-11-21 02:28


NVD link : CVE-2015-3026

Mitre link : CVE-2015-3026

CVE.ORG link : CVE-2015-3026


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • opensuse

xiph

  • icecast