9 lines
No EOL
563 B
Text
Executable file
9 lines
No EOL
563 B
Text
Executable file
source: http://www.securityfocus.com/bid/26899/info
|
|
|
|
PeerCast is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer.
|
|
|
|
Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.
|
|
|
|
These issues affect PeerCast 0.12.17, SVN 334 and prior versions.
|
|
|
|
http://www.exploit-db.com/sploits/30894.zip |