Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61056
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: peercast
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: peercast

CVE-2008-2040
Stack-based buffer overflow in the HTTP::getAuthUserPass function
(core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code via a Basic Authentication string with a long
(1) username or (2) password.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-2040
BugTraq ID: 28986
http://www.securityfocus.com/bid/28986
Debian Security Information: DSA-1582 (Google Search)
http://www.debian.org/security/2008/dsa-1582
Debian Security Information: DSA-1583 (Google Search)
http://www.debian.org/security/2008/dsa-1583
http://security.gentoo.org/glsa/glsa-200807-11.xml
http://secunia.com/advisories/29962
http://secunia.com/advisories/30020
http://secunia.com/advisories/30320
http://secunia.com/advisories/30325
http://secunia.com/advisories/31182
http://www.vupen.com/english/advisories/2008/1409/references
http://www.vupen.com/english/advisories/2008/1410/references
XForce ISS Database: peercast-httpgetauthuserpass-bo(42092)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42092
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.