Kazaa Altnet Download Manager prior 4.0.0.4 ActiveX control buffer overflow 1.1
 
Plugin ID143
Plugin nameKazaa Altnet Download Manager prior 4.0.0.4 ActiveX control buffer overflow
Plugin filenameKazaa Altnet Download-Manager prior 4.0.0.4 ActiveX control buffer overflow.plugin
Plugin filesize3147 bytes
Plugin familyPeer-to-Peer
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/05
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.1
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1
Plugin protocoltcp
Plugin port1214
Plugin procedure detectionopen|send GET / HTTP/1.0\n\n|sleep|close|pattern_exists X-Kazaa-Username:
Plugin detection accuracy97
Plugin commentThis plugin is not very accurate! You have to verify the existence of the potentially affected Altnet Download-Manager on the host.
Bug published nameCelebrityHacker
Bug published date2004/09/03
Bug advisoryhttp://secunia.com/advisories/12446
Bug affectedAltnet Download-Manager prior 4.0.0.4
Bug not affectedAltnet Download-Manager newer than 4.0.0.4 or other download managers
Bug vulnerability classBuffer Overflow
Bug descriptionThe target system may running the peer-to-peer software Kazaa. The popular filesharing clients Kazaa and Grokster also provide a download-manager by Altnet. This is vulnerable to a buffer overflow in the IsValidFile() method in the ADM ActiveX control. An attacker may run arbitrary web code on the target system.
Bug solutionDisable the peer-to-peer software if not allowed nor needed. If it should run then filter incoming traffic on port tcp/1214 to prevent unwanted access to the web service. Also de-install or de-activate or uphrade the affected Download-Manager by Altnet.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityNo
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity7
Bug simplicity6
Bug impact9
Bug risk7
Source Secunia ID12446
Source Heise Security50657
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://secunia.com/product/3862/

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.