Vulnerability Name: | CVE-2008-2040 (CCN-42092) | ||||||||||||||||||||||||||||
Assigned: | 2008-04-29 | ||||||||||||||||||||||||||||
Published: | 2008-04-29 | ||||||||||||||||||||||||||||
Updated: | 2017-08-08 | ||||||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:UR)
4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:UR)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||
References: | Source: CCN Type: Debian Bug report logs - #478573 [peercast] stack-based buffer overflow in HTTP::getAuthUserPass function Source: CONFIRM Type: Exploit http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573 Source: CCN Type: Debian Bug report logs - #478680 [gnome-peercast] CVE-2008-2040 stack-based buffer overflow in HTTP::getAuthUserPass function Source: CONFIRM Type: Exploit http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680 Source: MITRE Type: CNA CVE-2008-2040 Source: CCN Type: SA29962 PeerCast "HTTP::getAuthUserPass()" Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 29962 Source: CCN Type: SA30020 GNOME PeerCast "HTTP::getAuthUserPass()" Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 30020 Source: SECUNIA Type: UNKNOWN 30320 Source: SECUNIA Type: UNKNOWN 30325 Source: SECUNIA Type: UNKNOWN 31182 Source: GENTOO Type: UNKNOWN GLSA-200807-11 Source: DEBIAN Type: UNKNOWN DSA-1582 Source: DEBIAN Type: UNKNOWN DSA-1583 Source: DEBIAN Type: DSA-1582 peercast -- buffer overflow Source: DEBIAN Type: DSA-1583 gnome-peercast -- buffer overflow Source: CCN Type: GLSA-200807-11 PeerCast: Buffer overflow Source: CCN Type: OSVDB ID: 44924 PeerCast HTTP::getAuthUserPass() Function Basic Authentication String Remote Overflow DoS Source: CCN Type: PeerCast Web site PeerCast P2P Broadcasting Source: BID Type: UNKNOWN 28986 Source: CCN Type: BID-28986 PeerCast 'getAuthUserPass' Multiple Buffer Overflow Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2008-1409 Source: VUPEN Type: UNKNOWN ADV-2008-1410 Source: XF Type: UNKNOWN peercast-httpgetauthuserpass-bo(42092) Source: XF Type: UNKNOWN peercast-httpgetauthuserpass-bo(42092) | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |