On Sun, 9 Jul 2006 19:30:05 +0200 Sune Kloppenborg Jeppesen <jaervosz@xxxxxxxxxx> wrote: hmmm...could somebody verify if this vulnerability really works ? i tried it on 3 machines , but without success. Regards, Cyneox > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > Gentoo Linux Security Advisory GLSA 200607-05 > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > http://security.gentoo.org/ > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > > Severity: Normal > Title: SHOUTcast server: Multiple vulnerabilities > Date: July 09, 2006 > Bugs: #136721, #136221 > ID: 200607-05 > > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - > > Synopsis > ======== > > The SHOUTcast server is vulnerable to a file disclosure vulnerability > and multiple XSS vulnerabilities. > > Background > ========== > > SHOUTcast server is a streaming audio server. > > Affected packages > ================= > > ------------------------------------------------------------------- > Package / Vulnerable / Unaffected > ------------------------------------------------------------------- > 1 media-sound/shoutcast-server-bin < 1.9.7 >= 1.9.7 > > Description > =========== > > The SHOUTcast server is vulnerable to a file disclosure when the server > receives a specially crafted GET request. Furthermore it also fails to > sanitize the input passed to the "Description", "URL", "Genre", "AIM", > and "ICQ" fields. > > Impact > ====== > > By sending a specially crafted GET request to the SHOUTcast server, the > attacker can read any file that can be read by the SHOUTcast process. > Furthermore it is possible that various request variables could also be > exploited to execute arbitrary scripts in the context of a victim's > browser. > > Workaround > ========== > > There is no known workaround at this time. > > Resolution > ========== > > All SHOUTcast server users should upgrade to the latest version: > > # emerge --sync > # > emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.7" > > References > ========== > > [ 1 ] Original advisory > http://people.ksp.sk/~goober/advisory/001-shoutcast.html > [ 2 ] SA20524 > http://secunia.com/advisories/20524/ > > Availability > ============ > > This GLSA and any updates to it are available for viewing at > the Gentoo Security Website: > > http://security.gentoo.org/glsa/glsa-200607-05.xml > > Concerns? > ========= > > Security is a primary focus of Gentoo Linux and ensuring the > confidentiality and security of our users machines is of utmost > importance to us. Any security concerns should be addressed to > security@xxxxxxxxxx or alternatively, you may file a bug at > http://bugs.gentoo.org. > > License > ======= > > Copyright 2006 Gentoo Foundation, Inc; referenced text > belongs to its owner(s). > > The contents of this document are licensed under the > Creative Commons - Attribution / Share Alike license. > > http://creativecommons.org/licenses/by-sa/2.5 >