FastTrack (FT) Crafted Packet Handling Remote Overflow
High Nessus Plugin ID 11844
SynopsisThe remote peer-to-peer client is prone to a buffer overflow attack.
DescriptionThe remote service seems to be a Kazaa peer-to-peer client.
The FastTrack (FT) network code, as used in Kazaa and possibly other P2P clients, contains a remotely exploitable flaw in its packet handling code. Sending a specially crafted packet with a large list of supernodes may allow execution of arbitrary code.
SolutionUnknown at this time.