ID |
CVE-2006-0474
|
Summary |
Multiple integer overflows in Shareaza 2.2.1.0 allow remote attackers to execute arbitrary code via (1) a large packet length field, which causes an overflow in the ReadBuffer function in (a) BTPacket.cpp and (b) EDPacket.cpp, or (2) a large packet, which causes a heap-based overflow in the Write function in (c) Packet.h. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.5 (as of 19-10-2018 - 15:45) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 16399 | bugtraq | 20060127 Shareaza P2P Remote Vulnerability | confirm | | fulldisc | 20060126 Shareaza Remote Vulnerability | misc | http://www.hustlelabs.com/shareaza_advisory.pdf | sreason | 382 | xf | - shareaza-btpacket-bo(24342)
- shareaza-cedpacket-bo(24343)
- shareaza-cpacket-bo(24344)
|
|
Last major update |
19-10-2018 - 15:45 |
Published |
31-01-2006 - 11:03 |
Last modified |
19-10-2018 - 15:45 |