FastTrack (FT) Crafted Packet Handling Remote Overflow

high Nessus Plugin ID 11844

Language:

Synopsis

The remote peer-to-peer client is prone to a buffer overflow attack.

Description

The remote service seems to be a Kazaa peer-to-peer client.

The FastTrack (FT) network code, as used in Kazaa and possibly other P2P clients, contains a remotely exploitable flaw in its packet handling code. Sending a specially crafted packet with a large list of supernodes may allow execution of arbitrary code.

Solution

Unknown at this time.

See Also

https://seclists.org/bugtraq/2003/May/279

Plugin Details

Severity: High

ID: 11844

File Name: kazaa_network.nasl

Version: 1.17

Type: remote

Published: 9/22/2003

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/26/2003

Reference Information

CVE: CVE-2003-0397

BID: 7680