[19598] in bugtraq

home help back first fref pref prev next nref lref last post

Icecast / Libshout remote vulnerabilities

daemon@ATHENA.MIT.EDU (John Viega)
Mon Mar 12 04:18:18 2001

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
              protocol="application/pgp-signature"; boundary="bg08WKrSYDhXBjb5"
Content-Disposition: inline
Message-ID:  <20010312013927.A884@list.org>
Date:         Mon, 12 Mar 2001 01:39:27 -0500
Reply-To: John Viega <viega@LIST.ORG>
From: John Viega <viega@LIST.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM

--bg08WKrSYDhXBjb5
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

We have found numerous remotely exploitable buffer overflows in both
Icecast and Libshout, two popular packages for streaming audio.  All
users of these packages are urged to upgrade immediately.

Patched versions of these packages are available as of March 11, 2001
from www.icecast.org.  All versions prior to Icecast 1.3.9 and
Libshout 1.0.4 are vulnerable.

Matt Messier (mmessier@prilnari.com)
John Viega (viega@list.org) =20

--bg08WKrSYDhXBjb5
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6rG8e6G5NxBeqKQ4RAv3AAJ4o0pbbCI/KXmklE6UeX1s7gkmWwQCfXsmQ
9g1CUma55F994ol2GsaFZoo=
=Par7
-----END PGP SIGNATURE-----

--bg08WKrSYDhXBjb5--

home help back first fref pref prev next nref lref last post