First published: Thu Dec 23 2004(Updated: )
Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nullsoft SHOUTcast server | =1.9.4 | |
Nullsoft SHOUTcast server | =1.9.4 | |
Nullsoft SHOUTcast server | =1.9.4 | |
Nullsoft SHOUTcast Server | =1.9.4 | |
Nullsoft SHOUTcast Server | =1.9.4 | |
Nullsoft SHOUTcast Server | =1.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1373 is classified as a high severity vulnerability due to its potential to cause application crashes and execute arbitrary code.
To fix CVE-2004-1373, update to a version of SHOUTcast Server that is patched against format string vulnerabilities.
CVE-2004-1373 can be exploited by attackers using crafted URLs containing format string specifiers.
CVE-2004-1373 affects Nullsoft SHOUTcast Server version 1.9.4 on Win32, Mac OS X, and Linux platforms.
Exploiting CVE-2004-1373 can lead to a denial of service through application crashes and potentially allow for the execution of arbitrary code.