Gentoo Logo

PeerCast: Format string vulnerability


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200506-15 / peercast
Release Date June 19, 2005
Latest Revision May 22, 2006: 02
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-sound/peercast < 0.1212 >= 0.1212 All supported architectures

Related bugreports: #96199


PeerCast suffers from a format string vulnerability that could allow arbitrary code execution.

2.  Impact Information


PeerCast is a media streaming system based on P2P technology.


James Bercegay of the GulfTech Security Research Team discovered that PeerCast insecurely implements formatted printing when receiving a request with a malformed URL.


A remote attacker could exploit this vulnerability by sending a request with a specially crafted URL to a PeerCast server to execute arbitrary code.

3.  Resolution Information


There is no known workaround at this time.


All PeerCast users should upgrade to the latest available version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212"

4.  References


Page updated June 19, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.