First published: Wed Apr 08 2015(Updated: )
Icecast before 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mount=/test.ogg."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/icecast2 | <=2.3.3-1<=2.4.0-1.1 | 2.4.2-1 2.4.0-1.1+deb8u1 |
debian/icecast2 | 2.4.4-4 | |
Icecast | <=2.4.1 | |
Debian | =8.0 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3026 has a severity rating that indicates a risk of denial of service due to NULL pointer dereference.
To fix CVE-2015-3026, upgrade Icecast to version 2.4.2 or later.
Icecast versions prior to 2.4.2, including 2.4.0 and earlier, are affected by CVE-2015-3026.
Yes, CVE-2015-3026 can be exploited remotely through a request without login credentials.
CVE-2015-3026 represents a denial of service attack that causes server crashes.