Overview
There is an input validation error in the stand-alone SOAP server XMMS Remote which allows unauthorized remote command execution.
Description
XMMS Remote is a stand-alone XML/SOAP HTTP server implemented in PERL created by X2 Studios. It is used to monitor a running xmms media player client, typically on Mac OS X systems, but it appears to be easily ported to multiple platforms. (xmms, the X Multimedia System, is an audio player for X) The PERL module XMMS.pm contains an input validation error which allows arbitrary commands received from a network port (8086/tcp by default) to be executed in the command shell running the service. DetailsIn XMMS.pm, calls to the PERL function system()were passed in unfiltered: |
Impact
Unauthorized remote command execution with the privileges of the XMMS Remote service (note: not typically a privileged account). |
Solution
Update to a non-vulnerable version of XMMS.pm (created after May 07, 2003 - 1:40PM PST): |
WorkaroundsBlock external access to the XML/SOAP service being offered by XMMS Remote, port 8086/tcp by default. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Credit to Chris Dolan for reporting this vulnerability to X2 Studios.
This document was written by Jeffrey S. Havrilla
Other Information
CVE IDs: | None |
Severity Metric: | 1.62 |
Date Public: | 2003-05-07 |
Date First Published: | 2003-05-14 |
Date Last Updated: | 2003-05-15 14:33 UTC |
Document Revision: | 11 |