SHOUTcast filename format string vulnerability
Added: 05/17/2006CVE: CVE-2004-1373
BID: 12096
OSVDB: 12585
Background
SHOUTcast is a streaming audio server based on Winamp.Problem
A format string vulnerability in SHOUTcast allows remote attackers to execute commands by requesting a MP3 filename containing format string characters such as %n.Resolution
Upgrade to SHOUTcast 1.9.5 or higher.References
http://archives.neohapsis.com/archives/bugtraq/2004-12/0366.htmlLimitations
Exploit works on SHOUTcast 1.9.4. The exploit may fail on servers using Security Enhanced Linux.Platforms
Windows 2000Windows XP
Linux
Back to exploit index