9 lines
No EOL
603 B
Text
9 lines
No EOL
603 B
Text
source: https://www.securityfocus.com/bid/26899/info
|
|
|
|
PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer.
|
|
|
|
Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.
|
|
|
|
These issues affect PeerCast 0.12.17, SVN 334 and prior versions.
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30894.zip |