Security Alert: Streamripper buffer overflow bug

Posted on in Categories Debian Linux, Security Alert last updated November 8, 2008

Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper (CVE-2007-4337, CVE-2008-4829).

For the stable distribution (etch), these problems have been fixed in version 1.61.27-1+etch1.

For the unstable distribution (sid) and the testing distribution (lenny), these problems have been fixed in version 1.63.5-2.

How do I fix this bug and update package?

Simply type the following two commands:
# apt-get update
# apt-get upgrade

Posted by: Vivek Gite

The author is the creator of nixCraft and a seasoned sysadmin and a trainer for the Linux operating system/Unix shell scripting. He has worked with global clients and in various industries, including IT, education, defense and space research, and the nonprofit sector. Follow him on Twitter, Facebook, Google+.

Leave a Comment