"evaluatorComment":"This vulnerability has been addressed through a product update:\r\nhttp://www.icecast.org/ezstream.php#ez_download",
"descriptions":[
{
"lang":"en",
"value":"Multiple buffer overflows in src/ezstream.c in Ezstream before 0.3.0 allow remote attackers to execute arbitrary code via a crafted XML configuration file processed by the (1) urlParse function, which causes a stack-based overflow and the (2) ReplaceString function, which causes a heap-based overflow. NOTE: some of these details are obtained from third party information."
},
{
"lang":"es",
"value":"M\u00faltiples desbordamientos de b\u00fafer en el src/ezstream.c del Ezstream before 0.3.0 permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante la manipulaci\u00f3n del fichero de configuraci\u00f3n XML procesado por (1) la funci\u00f3n urlParse, lo que provoca desbordamientos basados en pila y (2) la funci\u00f3n ReplaceString, lo que provoca desbordamientos basados en mont\u00f3n. NOTA: algunos de los detalles se obtienen a partir de la informaci\u00f3n de terceros."