Vulnerabilities > CVE-2004-1373 - Unspecified vulnerability in Nullsoft Shoutcast Server 1.9.4

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
nullsoft
nessus
exploit available
metasploit

Summary

Format string vulnerability in SHOUTcast 1.9.4 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via format string specifiers in a content URL, as demonstrated in the filename portion of a .mp3 file.

Vulnerable Configurations

Part Description Count
Application
Nullsoft
3

Exploit-Db

  • descriptionSHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow. CVE-2004-1373. Remote exploit for win32 platform
    idEDB-ID:16751
    last seen2016-02-02
    modified2010-04-30
    published2010-04-30
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16751/
    titleSHOUTcast DNAS/Win32 1.9.4 File Request Format String Overflow
  • descriptionSHOUTcast 1.9.4 File Request Format String Remote Exploit (win). CVE-2004-1373. Remote exploit for windows platform
    idEDB-ID:830
    last seen2016-01-31
    modified2005-02-19
    published2005-02-19
    reportermandragore
    sourcehttps://www.exploit-db.com/download/830/
    titleSHOUTcast 1.9.4 File Request Format String Remote Exploit win
  • descriptionSHOUTcast DNAS/Linux 1.9.4 Format String Remote Exploit. CVE-2004-1373. Remote exploit for linux platform
    idEDB-ID:712
    last seen2016-01-31
    modified2004-12-23
    published2004-12-23
    reporterpucik
    sourcehttps://www.exploit-db.com/download/712/
    titleSHOUTcast DNAS/Linux 1.9.4 - Format String Remote Exploit

Metasploit

descriptionThis module exploits a format string vulnerability in the Nullsoft SHOUTcast server for Windows. The vulnerability is triggered by requesting a file path that contains format string specifiers. This vulnerability was discovered by Tomasz Trojanowski and Damian Put.
idMSF:EXPLOIT/WINDOWS/HTTP/SHOUTCAST_FORMAT
last seen2020-01-14
modified2017-07-24
published2005-12-26
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/shoutcast_format.rb
titleSHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200501-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200501-04 (Shoutcast Server: Remote code execution) Part of the Shoutcast Server Linux binary has been found to improperly handle sprintf() parsing. Impact : A malicious attacker could send a formatted URL request to the Shoutcast Server. This formatted URL would cause either the server process to crash, or the execution of arbitrary code. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id16395
    published2005-02-14
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/16395
    titleGLSA-200501-04 : Shoutcast Server: Remote code execution
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200501-04.
    #
    # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(16395);
      script_version("1.18");
      script_cvs_date("Date: 2019/08/02 13:32:42");
    
      script_cve_id("CVE-2004-1373");
      script_xref(name:"GLSA", value:"200501-04");
    
      script_name(english:"GLSA-200501-04 : Shoutcast Server: Remote code execution");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200501-04
    (Shoutcast Server: Remote code execution)
    
        Part of the Shoutcast Server Linux binary has been found to improperly
        handle sprintf() parsing.
      
    Impact :
    
        A malicious attacker could send a formatted URL request to the
        Shoutcast Server. This formatted URL would cause either the server
        process to crash, or the execution of arbitrary code.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      # http://www.securityfocus.com/archive/1/385350
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.securityfocus.com/archive/1/385350"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200501-04"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Shoutcast Server users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=media-sound/shoutcast-server-bin-1.9.5'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'SHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:shoutcast-server-bin");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2005/01/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"media-sound/shoutcast-server-bin", unaffected:make_list("ge 1.9.5"), vulnerable:make_list("le 1.9.4-r1"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Shoutcast Server");
    }
    
  • NASL familyCGI abuses
    NASL idSHOUTCAST_FMT_STRING.NASL
    descriptionAccording to its banner, the version of SHOUTcast Server installed on the remote host is earlier than 1.9.5. Such versions fail to validate requests containing format string specifiers before using them in a call to
    last seen2020-06-01
    modified2020-06-02
    plugin id16064
    published2004-12-28
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16064
    titleSHOUTcast Server Filename Handling Format String
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(16064);
     script_version("1.20");
     script_cvs_date("Date: 2018/11/15 20:50:18");
    
     script_cve_id("CVE-2004-1373");
     script_bugtraq_id(12096);
    
     script_name(english:"SHOUTcast Server Filename Handling Format String");
     script_summary(english:"SHOUTcast version check");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote streaming audio server is vulnerable to a format string
    attack.");
     script_set_attribute(attribute:"description", value:
    "According to its banner, the version of SHOUTcast Server installed on
    the remote host is earlier than 1.9.5.  Such versions fail to validate
    requests containing format string specifiers before using them in a call
    to 'sprintf()'.  An unauthenticated, remote attacker may be able to
    exploit this issue to execute arbitrary code on the remote host." );
     script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2004/Dec/363");
     script_set_attribute(attribute:"solution", value:"Upgrade to SHOUTcast 1.9.5 or later.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"metasploit_name", value:'SHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
     script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2004/12/23");
     script_set_attribute(attribute:"plugin_publication_date", value:"2004/12/28");
    
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:nullsoft:shoutcast_server");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
    
     script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
     script_family(english:"CGI abuses");
    
     script_dependencie("http_version.nasl");
     script_require_ports("Services/www", 8000);
     exit(0);
    }
    
    #
    # The script code starts here
    #
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    req = 'GET /content/' + rand_str(length:10) + '.mp3 HTTP/1.0\r\n\r\n';
    
    port = get_http_port(default: 8000);
    
    w = http_send_recv_buf(port:port, data:req);
    if (isnull(w)) exit(1, "The web server on port "+port+" did not answer");
    banner = strcat(w[0], w[1], '\r\n', w[2]);
    
    if (egrep(pattern:"SHOUTcast Distributed Network Audio Server.*v(0\.|1\.[0-8]\.|1\.9\.[0-4][^0-9])", string:banner) )
      {
       security_hole(port);
       exit(0);
      }
    

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83218/shoutcast_format.rb.txt
idPACKETSTORM:83218
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83218/SHOUTcast-DNAS-win32-1.9.4-File-Request-Format-String-Overflow.html
titleSHOUTcast DNAS/win32 1.9.4 File Request Format String Overflow

Saint

bid12096
descriptionSHOUTcast filename format string vulnerability
idmisc_shoutcast,misc_shoutcastx
osvdb12585
titleshoutcast_filename_format_string
typeremote