Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-18820

Опубликовано: 05 нояб. 2018
Источник: debian
EPSS Средний

Описание

A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
icecast2fixed2.4.4-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2018/11/01/3

  • https://gitlab.xiph.org/xiph/icecast-server/issues/2342

  • Fixed by: https://gitlab.xiph.org/xiph/icecast-server/commit/b21a7283bd1598c5af0bbb250a041ba8198f98f2

  • Additional issue fixed with https://gitlab.xiph.org/xiph/icecast-server/commit/03ea74c04a5966114c2fe66e4e6892d11a68181e

  • https://lgtm.com/blog/icecast_snprintf_CVE-2018-18820

EPSS

Процентиль: 98%
0.63676
Средний

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 7 лет назад

A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code execution.

CVSS3: 8.1
nvd
больше 7 лет назад

A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code execution.

suse-cvrf
около 7 лет назад

Security update for icecast

CVSS3: 8.1
github
больше 3 лет назад

A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code execution.

EPSS

Процентиль: 98%
0.63676
Средний