Vulnerabilities > CVE-2006-0051 - Remote HTTP_Peek Buffer Overflow vulnerability in Kaffeine

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
kaffeine
nessus

Summary

Buffer overflow in playlistimport.cpp in Kaffeine Player 0.4.2 through 0.7.1 allows user-assisted attackers to execute arbitrary code via long HTTP request headers when Kaffeine is "fetching remote playlists", which triggers the overflow in the http_peek function.

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200604-04.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200604-04 (Kaffeine: Buffer overflow) Kaffeine uses an unchecked buffer when fetching remote RAM playlists via HTTP. Impact : A remote attacker could entice a user to play a specially crafted RAM playlist resulting in the execution of arbitrary code with the permissions of the user running the application. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21197
    published2006-04-08
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21197
    titleGLSA-200604-04 : Kaffeine: Buffer overflow
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-268-1.NASL
    descriptionMarcus Meissner discovered a buffer overflow in the http_peek() function. By tricking an user into opening a specially crafted playlist URL with Kaffeine, a remote attacker could exploit this to execute arbitrary code with the user
    last seen2020-06-01
    modified2020-06-02
    plugin id21204
    published2006-04-08
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21204
    titleUbuntu 5.04 / 5.10 : kaffeine vulnerability (USN-268-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-065.NASL
    descriptionMarcus Meissner discovered Kaffeine contains an unchecked buffer while creating HTTP request headers for fetching remote RAM playlists, which allows overflowing a heap allocated buffer. As a result, remotely supplied RAM playlists can be used to execute arbitrary code on the client machine. Updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21200
    published2006-04-08
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21200
    titleMandrake Linux Security Advisory : kaffeine (MDKSA-2006:065)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1023.NASL
    descriptionMarcus Meissner discovered that kaffeine, a versatile media player for KDE 3, contains an unchecked buffer that can be overwritten remotely when fetching remote RAM playlists which can cause the execution of arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id22565
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22565
    titleDebian DSA-1023-1 : kaffeine - buffer overflow
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_4BFCD857C62811DAB2FB000E0C2E438A.NASL
    descriptionThe KDE team reports : Kaffeine can produce a buffer overflow in http_peek() while creating HTTP request headers for fetching remote playlists, which under certain circumstances could be used to crash the application and/or execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id21426
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21426
    titleFreeBSD : kaffeine -- buffer overflow vulnerability (4bfcd857-c628-11da-b2fb-000e0c2e438a)