Streamripper up to 1.62 lib/http.c httplib_parse_sc_header memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in Streamripper up to 1.62. The impacted element is the function httplib_parse_sc_header in the library lib/http.c. Executing a manipulation can lead to memory corruption.
This vulnerability is registered as CVE-2007-4337. No exploit is available.
You should upgrade the affected component.
Details
A vulnerability was found in Streamripper up to 1.62. It has been declared as critical. This vulnerability affects the function httplib_parse_sc_header in the library lib/http.c. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, and integrity. CVE summarizes:
Multiple buffer overflows in the httplib_parse_sc_header function in lib/http.c in Streamripper before 1.62.2 allow remote attackers to execute arbitrary code via long (1) Location and (2) Server HTTP headers, a different vulnerability than CVE-2006-3124.
The weakness was published 08/12/2007 (Website). The advisory is shared for download at sourceforge.net. This vulnerability was named CVE-2007-4337 since 08/14/2007. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 26043 (GLSA-200709-03 : Streamripper: Buffer overflow), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks.
Upgrading to version 1.61.1 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (36057), Tenable (26043), SecurityFocus (BID 25278†), OSVDB (39533†) and Secunia (SA33061†). Similar entry is available at VDB-45187. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.5
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 26043
Nessus Name: GLSA-200709-03 : Streamripper: Buffer overflow
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 62845
OpenVAS Name: Debian Security Advisory DSA 1683-1 (streamripper)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Streamripper 1.61.1
Timeline
08/12/2007 🔍08/12/2007 🔍
08/12/2007 🔍
08/13/2007 🔍
08/14/2007 🔍
08/14/2007 🔍
08/14/2007 🔍
09/14/2007 🔍
09/18/2007 🔍
03/16/2015 🔍
07/21/2021 🔍
Sources
Advisory: sourceforge.netStatus: Confirmed
Confirmation: 🔍
CVE: CVE-2007-4337 (🔍)
GCVE (CVE): GCVE-0-2007-4337
GCVE (VulDB): GCVE-100-38320
OVAL: 🔍
X-Force: 36057
SecurityFocus: 25278 - Streamripper HTTP Header Parsing Buffer Overflow Vulnerabilities
Secunia: 33061
OSVDB: 39533 - Streamripper lib/http.c httplib_parse_sc_header() Function Multiple HTTP Header Processing Overflows
SecurityTracker: 1018553 - Streamripper Buffer Overflows in httplib_parse_sc_header() Let Remote Users Execute Arbitrary Code
Vulnerability Center: 16059 - Streamripper < 1.62.2 Remote Code Execution via Long HTTP Headers, High
Vupen: ADV-2007-2858
See also: 🔍
Entry
Created: 03/16/2015 12:18Updated: 07/21/2021 14:56
Changes: 03/16/2015 12:18 (71), 08/22/2017 11:24 (11), 07/21/2021 14:56 (3)
Complete: 🔍
Cache ID: 216:F94:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.