aboutsummaryrefslogtreecommitdiff
path: root/share/security/advisories/FreeBSD-SA-01:23.icecast.asc
diff options
context:
space:
mode:
authorBjoern A. Zeeb <bz@FreeBSD.org>2012-08-15 06:19:40 +0000
committerBjoern A. Zeeb <bz@FreeBSD.org>2012-08-15 06:19:40 +0000
commit3571e5304050aba8c8eab50a86c6c0a073e4710b (patch)
treede84b0c3c5ffde32e607bf0686e9f27bb7a78ef0 /share/security/advisories/FreeBSD-SA-01:23.icecast.asc
parent01c8718f26f092070b0b20b4902a2a313033ed79 (diff)
downloaddoc-3571e5304050aba8c8eab50a86c6c0a073e4710b.tar.gz
doc-3571e5304050aba8c8eab50a86c6c0a073e4710b.zip
Import FreeBSD Security Advisories and Errata Notices, as well as their
patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
Notes
Notes: svn path=/head/; revision=39381
Diffstat (limited to 'share/security/advisories/FreeBSD-SA-01:23.icecast.asc')
-rw-r--r--share/security/advisories/FreeBSD-SA-01:23.icecast.asc101
1 files changed, 101 insertions, 0 deletions
diff --git a/share/security/advisories/FreeBSD-SA-01:23.icecast.asc b/share/security/advisories/FreeBSD-SA-01:23.icecast.asc
new file mode 100644
index 0000000000..01177d1b31
--- /dev/null
+++ b/share/security/advisories/FreeBSD-SA-01:23.icecast.asc
@@ -0,0 +1,101 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+
+=============================================================================
+FreeBSD-SA-01:23 Security Advisory
+ FreeBSD, Inc.
+
+Topic: icecast port contains remote vulnerability
+
+Category: ports
+Module: icecast
+Announced: 2001-03-12
+Credits: |CyRaX| <cyrax@pkcrew.org>
+Affects: Ports collection prior to the correction date.
+Corrected: 2001-03-10
+Vendor status: Unresponsive
+FreeBSD only: NO
+
+I. Background
+
+icecast is a server for streaming MP3 audio.
+
+II. Problem Description
+
+The icecast software, versions prior to 1.3.7_1, contains multiple
+format string vulnerabilities, which allow a remote attacker to
+execute arbitrary code as the user running icecast, usually the root
+user.
+
+There are a number of other potential abuses of format strings which
+may or may not pose security risks, but have not currently been
+audited.
+
+The icecast port is not installed by default, nor is it "part of
+FreeBSD" as such: it is part of the FreeBSD ports collection, which
+contains nearly 4700 third-party applications in a ready-to-install
+format. The ports collections shipped with FreeBSD 3.5.1 and 4.2
+contain this problem since it was discovered after the releases.
+
+FreeBSD makes no claim about the security of these third-party
+applications, although an effort is underway to provide a security
+audit of the most security-critical ports.
+
+III. Impact
+
+Arbitrary remote users can execute arbitrary code on the local system
+as the user running icecast, usually the root user.
+
+If you have not chosen to install the icecast port/package, then your
+system is not vulnerable to this problem.
+
+IV. Workaround
+
+Deinstall the icecast port/package, if you have installed it.
+
+V. Solution
+
+Consider running the icecast software as a non-privileged user to
+minimize the impact of further security vulnerabilities in this
+software.
+
+To upgrade icecast, choose one of the following options:
+
+1) Upgrade your entire ports collection and rebuild the icecast port.
+
+2) Deinstall the old package and install a new package dated after the
+correction date, obtained from:
+
+[i386]
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/audio/icecast-1.3.7_1.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/audio/icecast-1.3.7_1.tgz
+
+NOTE: It may be several days before updated packages are available
+
+[alpha]
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/audio/icecast-1.3.7_1.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/audio/icecast-1.3.7_1.tgz
+
+3) download a new port skeleton for the icecast port from:
+
+http://www.freebsd.org/ports/
+
+and use it to rebuild the port.
+
+4) Use the portcheckout utility to automate option (3) above. The
+portcheckout port is available in /usr/ports/devel/portcheckout or the
+package can be obtained from:
+
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/devel/portcheckout-2.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/devel/portcheckout-2.0.tgz
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v1.0.4 (FreeBSD)
+Comment: For info see http://www.gnupg.org
+
+iQCVAwUBOq1b9lUuHi5z0oilAQF0VQQAgjsvLSPtZ1pu6OtkGxuMJhCmmeCvFJvL
+4szsF1csrFrXhaH7z1VjJP8r/Q2NBzWcS3qujkhGRObsGGyvAJKk7QVrqnjXV3gD
+rgLnphjNlKt0VuXafxXwTT8YTxoCbzOHy23aa0KaRWoCAVcVi4AAZs4XHEUgU+Ov
+lWOyEgxUBEk=
+=WM3Y
+-----END PGP SIGNATURE-----