CVE-2007-1344

critical

Description

Multiple buffer overflows in src/ezstream.c in Ezstream before 0.3.0 allow remote attackers to execute arbitrary code via a crafted XML configuration file processed by the (1) urlParse function, which causes a stack-based overflow and the (2) ReplaceString function, which causes a heap-based overflow. NOTE: some of these details are obtained from third party information.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/32867

http://www.vupen.com/english/advisories/2007/0852

http://www.securityfocus.com/bid/22840

http://www.icecast.org/ezstream.php#ez_relnotes

http://secunia.com/advisories/24383

http://osvdb.org/33869

Details

Source: Mitre, NVD

Published: 2007-03-08

Updated: 2021-07-12

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical