Secunia - SHOUTcast DNAS Relay...

- AV AC AU C I A
发布: 2009-02-25
修订: 2025-04-13

Secunia Research has discovered a vulnerability in SHOUTcast DNAS, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error when receiving data from a relay master server. This can be exploited to overflow a static buffer by tricking a SHOUTcast admin into setting up a server to act as relay for a malicious server. Successful exploitation allows to e.g. overwrite the password of the web administration interface. Version 1.9.8 is affected.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息