Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0474

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2006-0474
Last Modified 05 Sep 2008 04:59:22
Published 31 Jan 2006 06:03:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0474

Summary

Multiple integer overflows in Shareaza 2.2.1.0 allow remote attackers to execute arbitrary code via (1) a large packet length field, which causes an overflow in the ReadBuffer function in (a) BTPacket.cpp and (b) EDPacket.cpp, or (2) a large packet, which causes a heap-based overflow in the Write function in (c) Packet.h.

Vulnerable Systems

Application

  • Shareaza 2.2.1.0


References

BID - 16399

BUGTRAQ - 20060127 Shareaza P2P Remote Vulnerability

MISC - http://www.hustlelabs.com/shareaza_advisory.pdf

CONFIRM - http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/EDPacket.cpp?r1=1.15&r2=1.15.2.1

CONFIRM - http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/BTPacket.cpp?r1=1.5&r2=1.5.4.1

XF - shareaza-cpacket-bo(24344)

XF - shareaza-cedpacket-bo(24343)

XF - shareaza-btpacket-bo(24342)

SREASON - 382

FULLDISC - 20060126 Shareaza Remote Vulnerability


Last Updated: 27 May 2016 10:41:40