Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:EXPLOIT:SHOUTCAST-FMT-STR

Severity

Medium

Recommended

No

Category

HTTP

Keywords

Shoutcast Format String Attack

Release Date

2005/01/05

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Shoutcast Format String Attack


This signature detects attempts to exploit a known vulnerability in the Shoutcast streaming audio server. Attackers can gain complete control of the target host.

Extended Description

Nullsoft SHOUTcast is prone to a remotely exploitable format string vulnerability. The vulnerability is exposed when the server attempts to handle a client request for a file. Successful exploitation may allow execution of arbitrary code in the context of the server process. This could also be exploited to crash the server and, possibly, to read process memory (which could increase reliability of an exploit). This issue was reported to exist in version 1.9.4 on Linux. It is likely that versions for other platforms are also affected by the vulnerability, though it is not known to what degree they are exploitable. Earlier versions of the software are also likely affected.

Affected Products

  • NullSoft Shoutcast Server 1.9.4 Linux
  • NullSoft Shoutcast Server 1.9.4 Mac OS X
  • NullSoft Shoutcast Server 1.9.4 Win32

References

  • BugTraq: 12096
  • CVE: CVE-2004-1373
  • URL: http://www.securityfocus.com/archive/1/385350
  • URL: http://www.securityspace.com/smysecure/catid.html?id=16064

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out