Vulnerabilities > CVE-2003-0397 - Buffer Overflow vulnerability in Sharman Networks Kazaa V2.0.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Peer-To-Peer File Sharing |
NASL id | KAZAA_NETWORK.NASL |
description | The remote service seems to be a Kazaa peer-to-peer client. The FastTrack (FT) network code, as used in Kazaa and possibly other P2P clients, contains a remotely exploitable flaw in its packet handling code. Sending a specially crafted packet with a large list of supernodes may allow execution of arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11844 |
published | 2003-09-22 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11844 |
title | FastTrack (FT) Crafted Packet Handling Remote Overflow |
code |
|