256fd3b308
Fixes CVE-2005-0837. The vulnerability, identified as CVE-2005-0837, allows an attacker to acces the raw XSLT template file by appending a dot “.” to the URL. Due to the way how Windows handles file names ending with a dot, it only affects Icecast versions < 2.4.3 running on Windows. Icecast on other operating systems, like Linux, wasn’t affected at any time by this issue. If you haven’t modified the default XSLT files of a Windows installation, then no information disclosure of real value could have happened. We expect that most, of the comparatively few, Windows installations have unmodified template files and thus, while technically vulnerable, only expose those unmodified templates. To be clear, no runtime information can be accessed this way.
9 lines
583 B
Text
9 lines
583 B
Text
$NetBSD: distinfo,v 1.22 2016/02/09 07:02:54 adam Exp $
|
|
|
|
SHA1 (icecast-2.4.3.tar.gz) = 230e2aa5abf80010c42d41cc7c0b078fb542b080
|
|
RMD160 (icecast-2.4.3.tar.gz) = 57717c26258dd9f2a52f548bff1745e8ea9e608c
|
|
SHA512 (icecast-2.4.3.tar.gz) = 70e755ee935e738f2b7310333823992517747897692d101b67d73d5cd40d6385a20c25d089a0430806c116021e6e2055761efee9fec27cd9bccb2b58a2bfd446
|
|
Size (icecast-2.4.3.tar.gz) = 2393358 bytes
|
|
SHA1 (patch-aa) = d3f4891295143adc261b3bf076e924f4540c6030
|
|
SHA1 (patch-ab) = 4abb78f2067369600851abca71bb19049d8a41e8
|
|
SHA1 (patch-ac) = ce0a5474a88e5b768cd1c37ee0c934895a49093a
|