oss-sec mailing list archives

Icecast 2.4.4 - CVE-2018-18820 - buffer overflow in url-auth


From: Thomas B. Rücker <thomas () ruecker fi>
Date: Thu, 1 Nov 2018 16:21:32 +0000

We released a new version of Icecast.
It is a security release and we recommend to update all
Icecast installations of versions below 2.4.4 to it.

-   Fix buffer overflows in URL auth code, [CVE-2018-18820]. [#2342]
    * This security issue affects all Icecast servers running version
      2.4.0, 2.4.1, 2.4.2 or 2.4.3 if there is a "mount" definition
      that enables URL authentication.
    * A malicious client could send long HTTP headers, leading to
      a buffer overflow and potential remote code execution.
    * The problematic code was introduced in version 2.4.0 and
      was now brought to our attention by Nick Rolfe of
      Semmle Security Research Team https://lgtm.com/security

https://gitlab.xiph.org/xiph/icecast-server/commit/b21a7283bd1598c5af0bbb250a041ba8198f98f2

-   Worked around buffer overflows in URL auth's cURL interface.
    * We currently do not believe that this issue is exploitable.
      It would require a malicious URL authentication back end server
      to send a crafted payload and make it through libcURL.
    * If someone manages, please let us know.

https://gitlab.xiph.org/xiph/icecast-server/commit/03ea74c04a5966114c2fe66e4e6892d11a68181e

Source: http://downloads.xiph.org/releases/icecast/icecast-2.4.4.tar.gz

[#2342]: https://gitlab.xiph.org/xiph/icecast-server/issues/2342


Thomas B. Ruecker
Icecast maintainer

PS: Default installations are not affected. This is an advanced feature.



Attachment: signature.asc
Description: OpenPGP digital signature


Current thread: