Buffer overflow in the HTTP header parsing in Streamripper before 1.61.26 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted HTTP headers.
Link | Tags |
---|---|
http://secunia.com/advisories/21749 | third party advisory |
http://sourceforge.net/project/shownotes.php?release_id=442126 | patch |
http://www.debian.org/security/2006/dsa-1158 | vendor advisory |
http://secunia.com/advisories/21579 | third party advisory patch vendor advisory |
http://secunia.com/advisories/21658 | third party advisory |
http://secunia.com/advisories/21801 | third party advisory |
http://www.securityfocus.com/bid/19707 | vdb entry patch |
http://www.novell.com/linux/security/advisories/2006_21_sr.html | vendor advisory |
http://downloads.securityfocus.com/vulnerabilities/exploits/streamripper-aug292006.c | |
http://security.gentoo.org/glsa/glsa-200609-01.xml | vendor advisory |
http://www.vupen.com/english/advisories/2006/3387 | vdb entry |
http://www.osvdb.org/28178 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28567 | vdb entry |