|
Message-ID: <c1ac7903-8147-b8f9-4683-d03af14d1567@ruecker.fi>
Date: Thu, 1 Nov 2018 16:21:32 +0000
From: Thomas B. Rücker <thomas@...cker.fi>
To: oss-security@...ts.openwall.com
Subject: Icecast 2.4.4 - CVE-2018-18820 - buffer overflow in url-auth
We released a new version of Icecast.
It is a security release and we recommend to update all
Icecast installations of versions below 2.4.4 to it.
- Fix buffer overflows in URL auth code, [CVE-2018-18820]. [#2342]
* This security issue affects all Icecast servers running version
2.4.0, 2.4.1, 2.4.2 or 2.4.3 if there is a "mount" definition
that enables URL authentication.
* A malicious client could send long HTTP headers, leading to
a buffer overflow and potential remote code execution.
* The problematic code was introduced in version 2.4.0 and
was now brought to our attention by Nick Rolfe of
Semmle Security Research Team https://lgtm.com/security
https://gitlab.xiph.org/xiph/icecast-server/commit/b21a7283bd1598c5af0bbb250a041ba8198f98f2
- Worked around buffer overflows in URL auth's cURL interface.
* We currently do not believe that this issue is exploitable.
It would require a malicious URL authentication back end server
to send a crafted payload and make it through libcURL.
* If someone manages, please let us know.
https://gitlab.xiph.org/xiph/icecast-server/commit/03ea74c04a5966114c2fe66e4e6892d11a68181e
Source: http://downloads.xiph.org/releases/icecast/icecast-2.4.4.tar.gz
[#2342]: https://gitlab.xiph.org/xiph/icecast-server/issues/2342
Thomas B. Ruecker
Icecast maintainer
PS: Default installations are not affected. This is an advanced feature.
Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.