ID CVE-2005-1806
Summary Format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code via format strings in the URL.
References
Vulnerable Configurations
  • cpe:2.3:a:peercast:peercast:0.1211
    cpe:2.3:a:peercast:peercast:0.1211
CVSS
Base: 7.5 (as of 01-06-2005 - 17:14)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
  • description PeerCast <= 0.1211 Remote Format String Exploit. CVE-2005-1806. Remote exploit for linux platform
    id EDB-ID:1055
    last seen 2016-01-31
    modified 2005-06-20
    published 2005-06-20
    reporter darkeagle
    source https://www.exploit-db.com/download/1055/
    title PeerCast <= 0.1211 - Remote Format String Exploit
  • description Peercast < 0.1211 - Format String. CVE-2005-1806. Dos exploit for Windows platform
    id EDB-ID:43826
    last seen 2018-01-24
    modified 2015-05-28
    published 2015-05-28
    reporter Exploit-DB
    source https://www.exploit-db.com/download/43826/
    title Peercast < 0.1211 - Format String
nessus via4
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200506-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-200506-15 (PeerCast: Format string vulnerability) James Bercegay of the GulfTech Security Research Team discovered that PeerCast insecurely implements formatted printing when receiving a request with a malformed URL. Impact : A remote attacker could exploit this vulnerability by sending a request with a specially crafted URL to a PeerCast server to execute arbitrary code. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-12-18
    plugin id 18530
    published 2005-06-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18530
    title GLSA-200506-15 : PeerCast: Format string vulnerability
  • NASL family Peer-To-Peer File Sharing
    NASL id PEERCAST_FORMAT_STRING.NASL
    description The version of PeerCast installed on the remote host suffers from a format string vulnerability. An attacker can issue requests containing format specifiers that will crash the server and potentially permit arbitrary code execution subject to privileges of the user under which the affected application runs.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 18417
    published 2005-06-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18417
    title PeerCast URL Error Message Format String
refmap via4
bugtraq 20050528 Format String Vulnerability In Peercast 0.1211 And Earlier
confirm http://www.peercast.org/forum/viewtopic.php?p=11596
gentoo GLSA-200506-15
misc http://www.gulftech.org/?node=research&article_id=00077-05282005
secunia
  • 15536
  • 15753
vupen ADV-2005-0651
Last major update 17-10-2016 - 23:22
Published 28-05-2005 - 00:00
Back to Top