RULE(RULE ID:332325)

Rule General Information
Release Date: 2021-01-21
Rule Name: SHOUTcast Filename Format String Vulnerability (CVE-2004-1373)
Severity:
CVE ID:
Rule Protection Details
Description: There exists a format string vulnerability in the SHOUTcast streaming server. A specially crafted filename in a URL passed to the vulnerable server can cause the server to read or write to invalid memory locations. An attacker can exploit this vulnerability to remotely execute code on a vulnerable target. In a simple attack case exploiting this vulnerability, the target SHOUTcast server will terminate causing a denial of service condition. The server must be restarted manually in order to restore the service. In the case of a more sophisticated attack, arbitrary code can be executed with the privileges of the account running SHOUTcast server. The behaviour of the target system will depend on the malicious code injected into the system. On all supported operating systems, the SHOUTcast server does not have a default user account. As such, the user account under which SHOUTcast is run would vary by site. Therefore, the privileges available to malicious code depends upon the user privileges of the owner of the vulnerable process.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:12096
http://marc.info/?l=bugtraq&m=110382975516003&w=2
http://marc.info/?l=bugtraq&m=110886444014745&w=2
SecurityTrackerID:1012675
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.shoutcast.com/