ID CVE-2003-0397
Summary Buffer overflow in FastTrack (FT) network code, as used in Kazaa 2.0.2 and possibly other versions and products, allows remote attackers to execute arbitrary code via a packet containing a large list of supernodes, aka "Packet 0' death."
References
Vulnerable Configurations
  • cpe:2.3:a:sharman_networks:kazaa:v2.0.2
    cpe:2.3:a:sharman_networks:kazaa:v2.0.2
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family Peer-To-Peer File Sharing
NASL id KAZAA_NETWORK.NASL
description The remote service seems to be a Kazaa peer-to-peer client. The FastTrack (FT) network code, as used in Kazaa and possibly other P2P clients, contains a remotely exploitable flaw in its packet handling code. Sending a specially crafted packet with a large list of supernodes may allow execution of arbitrary code.
last seen 2019-02-21
modified 2018-11-15
plugin id 11844
published 2003-09-22
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=11844
title FastTrack (FT) Crafted Packet Handling Remote Overflow
refmap via4
bid 7680
bugtraq 20030526 The PACKET 0' DEATH FastTrack network vulnerability
xf fastrack-packet-0-bo(12086)
Last major update 17-10-2016 - 22:33
Published 02-07-2003 - 00:00
Back to Top