---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Streamripper Multiple Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA32562 VERIFY ADVISORY: http://secunia.com/advisories/32562/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Streamripper 1.x http://secunia.com/advisories/product/11691/ DESCRIPTION: Secunia Research has discovered some vulnerabilities in Streamripper, which can be exploited by malicious people to compromise a user's system. 1) A boundary error exists within the function "http_parse_sc_header()" in lib/http.c when parsing an overly long HTTP header starting with "Zwitterion v". 2) A boundary error exists within the function "http_get_pls()" in lib/http.c when parsing a specially crafted pls playlist containing an overly long entry. 3) A boundary error exists within the function "http_get_m3u()" in lib/http.c when parsing a specially crafted m3u playlist containing an overly long "File" entry. Successful exploitation allows the execution of arbitrary code, but requires that a user is tricked into connecting to a malicious server. The vulnerabilities are confirmed in version 1.63.5. Other versions may also be affected. SOLUTION: Patches should be available soon. PROVIDED AND/OR DISCOVERED BY: Stefan Cornelius, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-50/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------