Impact
The vulnerability is a stack‑based buffer overflow in the Log Directory configuration field of JetCast Server 2.0. By supplying a crafted input, an attacker can overwrite structured exception handling pointers and execute arbitrary alphanumeric shellcode under the application's privileges. This results in local arbitrary code execution with the same rights as the running instance of JetCast Server.
Affected Systems
Jetaudio’s JetCast Server version 2.0 is affected. The CVE references a specific build of the JCS2000.exe binary associated with this version. No other versions are explicitly mentioned.
Risk and Exploitability
The Common Vulnerability Scoring System rates the flaw a score of 8.6, indicating a‑severity local privilege escalation risk. Exploitation requires local access to the machine or to a user account with permissions to modify the server’s configuration. No public exploit databases have listed this vulnerability in the KEV catalog, and there is no EPSS score available, but the high CVSS score suggests that if an attacker can achieve local execution, the impact would be severe. The likely attack vector is through the client interface that allows editing of the Log Directory field, where a specially crafted configuration string triggers the SEH overwrite.
OpenCVE Enrichment