Arch Linux Security Advisory ASA-201504-12
========================================
Severity: Medium
Date : 2015-04-11
CVE-ID : CVE-2015-3026
Package : icecast
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE
Summary
======
The package icecast before version 2.4.2-1 is vulnerable to denial of service.
Resolution
=========
Upgrade to 2.4.2-1.
# pacman -Syu "icecast>=2.4.2-1"
The problem has been fixed upstream in version 2.4.2.
Workaround
=========
None.
Description
==========
CVE-2015-3026 (denial of service):
The bug can only be triggered if "stream_auth" is being used.
This means, that all installations that use a default configuration are
NOT affected.The default configuration only uses .
Neither are simple mountpoints affected that use .
A workaround, if installing an updated package is not possible, is to
disable "stream_auth"and use instead.
As far as we understand the bug only leads to a simple remote denial of
service. The underlying issue is a null pointer dereference. For
clarity: No remote code execution should be possible, server just
segfaults.
Impact
=====
An attacker could kill, with triggering the server with a special URL,
the icecast-server due to a null pointer dereference.
References
=========https://seclists.org/oss-sec/2015/q2/78
https://seclists.org/oss-sec/2015/q2/80
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3026
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html