Gentoo Linux Security Advisory GLSA 200901-05 - Multiple buffer overflows have been discovered in Streamripper, allowing for user-assisted execution of arbitrary code. Stefan Cornelius from Secunia Research reported multiple buffer overflows in the http_parse_sc_header(), http_get_pls() and http_get_m3u() functions in lib/http.c when parsing overly long HTTP headers, or pls and m3u playlists with overly long entries. Versions less than 1.64.0 are affected.
06710cdf85609b49b9e02c8b791e5ed9458ce96767d0fc3900a9ba20f466791e
Debian Security Advisory 1683-1 - Multiple buffer overflows involving HTTP header and playlist parsing have been discovered in streamripper.
e31c37741d4c87bf8e0d7f90072b7d60e9bea91960d307dee4674120e5a311cc
Secunia Research has discovered some vulnerabilities in Streamripper, which can be exploited by malicious people to compromise a user's system. Version 1.63.5 is affected.
0c8bfbaaca5cc084c2c85ddbb2c6716f33329be58d9b2d16ad9cc4ec374f5157