[NEWS] Streamripper Multiple Buffer Overflows



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Streamripper Multiple Buffer Overflows
------------------------------------------------------------------------


SUMMARY

<http://streamripper.sourceforge.net/> Streamripper "records Shoutcast
and Live365 MP3 streams to a hard disk, creating separate files for each
track. Runs under Unix and Windows." Secunia Research has discovered some
vulnerabilities in Streamripper, which can be exploited by malicious
people to compromise a user's system.

DETAILS

Vulnerable Systems:
* Streamripper version 1.63.5

1) A boundary error exists within http_parse_sc_header() in lib/http.c
when parsing an overly long HTTP header starting with "Zwitterion v".

2) A boundary error exists within http_get_pls() in lib/http.c when
parsing a specially crafted pls playlist containing an overly long entry.

3) A boundary error exists within http_get_m3u() in lib/http.c when
parsing a specially crafted m3u playlist containing an overly long "File"
entry.

Successful exploitation allows execution of arbitrary code, but requires
that a user is tricked into connecting to a malicious server.

Time Table:
05/11/2008 - Vendor notified.
10/11/2008 - Vendor response.
14/11/2008 - Vendor informs that fixes are ready and will be uploaded to
CVS on the agreed disclosure date.
19/11/2008 - Public disclosure.


ADDITIONAL INFORMATION

The information has been provided by Secunia Research.
The original article can be found at:
<http://secunia.com/secunia_research/2008-50/>
http://secunia.com/secunia_research/2008-50/



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NT] w3wp DoS
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... 1/12/2006 - Vendor requested for additional info ... recv(conn_socket, szBuffer, 256, 0); ...
    (Securiteam)
  • [NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall ActiveX Control Arbitrary Code Execution ... The vulnerability is caused due to an implementation error within the ... 18/08/2008 - Vendor notified. ...
    (Securiteam)
  • [NT] Microsoft Hierarchical FlexGrid Control Integer Overflows (MS08-070)
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Microsoft Hierarchical FlexGrid Control Integer Overflows ... 28/08/2007 - Vendor notified. ...
    (Securiteam)
  • [NT] Adobe PageMaker PMD File Processing Buffer Overflows
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The vulnerabilities are caused due to boundary errors when processing ... The vendor will be releasing a fix for the stack-based buffer overflow ... 02/06/2008 - Vendor asks for CVE identifier. ...
    (Securiteam)
  • [NT] CA ARCserve Backup RPC "handle_t" Argument Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCserve Backup RPC "handle_t" Argument Vulnerability ... 24/10/2007 - Vendor notified. ... 21/05/2008 - Vendor notifies expected release in October 2008. ...
    (Securiteam)