what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

netric-adv006.txt

netric-adv006.txt
Posted Jun 5, 2002
Authored by eSDee, netric | Site netric.org

Nullsoft's SHOUTcast v1.8.9 contains a buffer overflow which can be exploited by a DJ to gain shell access to the system. Windows, Linux, and FreeBSD are known to be vulnerable.

tags | overflow, shell
systems | linux, windows, freebsd
SHA-256 | 7158bd00e24e44b040e478a07b40240d2a892aa29113f26ce162fe843ee4f733

netric-adv006.txt

Change Mirror Download
Netric Security Team - http://www.netric.org
by eSDee

SHOUTcast 1.8.9 remote bufferoverflow
Type: Stack Overflow
Priority: 2

[1] Description
[2] Vulnerable
[3] The exploit
[4] Vendor response


[1] Description

Nullsoft's SHOUTcast 1.8.9 contains a bufferoverflow that is remotely
exploitable. This allows a malicious DJ to gain unauthorized shell
access to the system.

The attacker must know the DJ password in order to exploit this
vulnerability. This will limit the impact of the bug, however
if for example the shoutcast server is running as root, a DJ
can obtain root privileges.

An attacker is able to overwrite stackdata, including the saved eip
register by sending the following data to port 8001:

password\n
icy-name: netric
icy-[doesn't matter]: [buffer]

The icy-name buffer can be overflowed too, but this buffer is not
stored on the stack.

[2] Vulnerable

version | vulnerable | exploitable |
WIN32 Console/GUI v1.8.9 | yes | not tested |
FreeBSD 4.x v1.8.9 | yes | yes |
Linux (glibc) v1.8.9 | yes | yes |
Mac OS X v1.8.9 | not tested | not tested |
Solaris Sparc 2.x v1.8.9 | not tested | not tested |

[3] The exploit

A remote exploit for 1.8.9 (linux) can be found at:
http://www.netric.org/exploits/mayday-linux.c

[4] Vendor response

This issue is fixed in shoutcast 1.8.12.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close