Impact
JetCast Server 2.0 contains a flaw that allows an attacker to cause the server to crash by entering an excessively long string into the Log directory configuration field. The input field accepts a buffer of 5000 characters, and after the user clicks Start, the application terminates the server process, resulting in a loss of service for all clients that rely on the server. The weakness is a type of buffer overrun that is represented by CWE‑1285 and results in a denial of service without compromising data confidentiality or integrity.
Affected Systems
The affected product is Jetaudio’s jetCast Server version 2.0. Information from the vendor’s CPE entry confirms that the vulnerability applies to this specific major version, and no other versions or products are listed as impacted in the CNA data.
Risk and Exploitability
The CVSS score of 6.8 places the vulnerability in the medium severity range. The exploit probability is not documented, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation. The likely attack vector is local, as the description specifies that local attackers can supply the long string. If an attacker has local access with permission to modify the Log directory setting, the crash can be triggered quickly, causing an immediate service outage until the server is restarted or patched.
OpenCVE Enrichment