Vulnerabilities > CVE-2003-0397 - Unspecified vulnerability in Sharman Networks Kazaa V2.0.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sharman-networks
nessus
Summary
Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Peer-To-Peer File Sharing |
NASL id | KAZAA_NETWORK.NASL |
description | The remote service seems to be a Kazaa peer-to-peer client. The FastTrack (FT) network code, as used in Kazaa and possibly other P2P clients, contains a remotely exploitable flaw in its packet handling code. Sending a specially crafted packet with a large list of supernodes may allow execution of arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11844 |
published | 2003-09-22 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11844 |
title | FastTrack (FT) Crafted Packet Handling Remote Overflow |
code |
|