Security Alert: Streamripper buffer overflow bug

last updated in Categories Debian Linux, Security Alert

Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution (lenny), these problems have been fixed in version 1.63.5-2.

How do I fix this bug and update package?

Simply type the following two commands:
# apt-get update
# apt-get upgrade

Get 15% off on Linux Foundation certified SysAdmin, Progamming, Kubernetes/Containers and Open Stack certification & course. Use "SPLASH15" coupon code. Offer expires on August 27, 2018
training.linuxfoundation.org

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.