First published: Mon Nov 05 2018(Updated: )
A buffer overflow was discovered in the URL-authentication backend of the Icecast before 2.4.4. If the backend is enabled, then any malicious HTTP client can send a request for that specific resource including a crafted header, leading to denial of service and potentially remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/icecast2 | 2.4.4-1 2.4.4-4 | |
Xiph Icecast | <2.4.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18820 is a buffer overflow vulnerability in the URL-authentication backend of the Icecast server before version 2.4.4.
CVE-2018-18820 has a severity rating of 8.1, which is considered high.
CVE-2018-18820 can lead to denial of service and potentially remote code execution if a malicious HTTP client sends a crafted header request to the URL-authentication backend of an Icecast server.
Icecast versions before 2.4.4 are affected by CVE-2018-18820.
To fix CVE-2018-18820, you should update your Icecast server to version 2.4.4-1 or 2.4.4-4, provided by the Debian package icecast2.