Bug 1210198 (CVE-2015-3026) - CVE-2015-3026 icecast: NULL pointer dereference in stream_auth handler leading to DoS
Summary: CVE-2015-3026 icecast: NULL pointer dereference in stream_auth handler leadin...
Alias: CVE-2015-3026
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1210199 1210200
TreeView+ depends on / blocked
Reported: 2015-04-09 07:31 UTC by Martin Prpič
Modified: 2019-09-29 13:31 UTC (History)
3 users (show)

Fixed In Version: icecast 2.4.2
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2015-08-17 10:13:57 UTC

Attachments (Terms of Use)

Description Martin Prpič 2015-04-09 07:31:33 UTC
A flaw was found in the client URL authentication handling code:

The bug can only be triggered if "stream_auth" is being used, for example:

  <authentication type="url">
    <option name="stream_auth" value="http://localhost/auth"/>

This means, that all installations that use a default configuration are NOT affected. The default configuration only uses <source-password>. Neither are simple mountpoints affected that use <password>.

A workaround, if installing an updated package is not possible, is to disable "stream_auth"and use <password> instead.

As far as we understand the bug only leads to a simple remote denial of service. The underlying issue is a null pointer dereference. For clarity: No remote code execution should be possible, server just segfaults.

Proof of concept:

curl "http://example.org:8000/admin/killsource?mount=/test.ogg";

Upstream issue:


Upstream announcement:


Upstream patch:


CVE request:


Comment 1 Martin Prpič 2015-04-09 07:32:00 UTC
Created icecast tracking bugs for this issue:

Affects: fedora-all [bug 1210199]
Affects: epel-all [bug 1210200]

Comment 2 Fedora Update System 2015-08-15 02:20:41 UTC
icecast-2.4.2-1.fc23 has been pushed to the Fedora 23 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.