FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  365353
Date:      2014-08-18
Time:      21:11:32Z
Committer: flo

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
402ae710-26a2-11dd-ae05-825f4c35000apeercast -- arbitrary code execution

Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execure arbitrary code.


Discovery 2008-05-20
Entry 2008-05-21
peercast
gt 0

28986
CVE-2008-2040
http://secunia.com/advisories/30020
31435fbc-ae73-11dc-a5f9-001a4d49522bpeercast -- buffer overflow vulnerability

Luigi Auriemma reports that peercast is vulnerable to a buffer overflow which could lead to a DoS or potentially remote code execution:

The handshakeHTTP function which handles all the requests received by the other clients is vulnerable to a heap overflow which allows an attacker to fill the loginPassword and loginMount buffers located in the Servent class with how much data he wants.


Discovery 2007-12-17
Entry 2007-12-19
Modified 2010-05-12
peercast
lt 0.1218

CVE-2007-6454
http://aluigi.altervista.org/adv/peercasthof-adv.txt
http://secunia.com/advisories/28120/
402ae710-26a2-11dd-ae05-825f4c35000apeercast -- arbitrary code execution

Nico Golde discovered that PeerCast, a P2P audio and video streaming server, is vulnerable to a buffer overflow in the HTTP Basic Authentication code, allowing a remote attacker to crash PeerCast or execure arbitrary code.


Discovery 2008-05-20
Entry 2008-05-21
peercast
gt 0

28986
CVE-2008-2040
http://secunia.com/advisories/30020
31435fbc-ae73-11dc-a5f9-001a4d49522bpeercast -- buffer overflow vulnerability

Luigi Auriemma reports that peercast is vulnerable to a buffer overflow which could lead to a DoS or potentially remote code execution:

The handshakeHTTP function which handles all the requests received by the other clients is vulnerable to a heap overflow which allows an attacker to fill the loginPassword and loginMount buffers located in the Servent class with how much data he wants.


Discovery 2007-12-17
Entry 2007-12-19
Modified 2010-05-12
peercast
lt 0.1218

CVE-2007-6454
http://aluigi.altervista.org/adv/peercasthof-adv.txt
http://secunia.com/advisories/28120/