Description
Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Nico Golde · pythondoslinux
https://www.exploit-db.com/exploits/31713
References (14)
Core 14
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200807-11.xml
Exploit x_refsource_confirm
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478680
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30020
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2008/dsa-1583
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30325
Exploit x_refsource_confirm
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478573
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29962
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42092
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2008/dsa-1582
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1410/references
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30320
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31182
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1409/references
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28986
Scores
EPSS
0.3325
EPSS Percentile
96.9%
Details
CWE
CWE-119
Status
published
Products (1)
peercast/peercast
0.1218
Published
Apr 30, 2008
Tracked Since
Feb 18, 2026