Required CVE Record Information
Description
Multiple integer overflows in Shareaza 2.2.1.0 allow remote attackers to execute arbitrary code via (1) a large packet length field, which causes an overflow in the ReadBuffer function in (a) BTPacket.cpp and (b) EDPacket.cpp, or (2) a large packet, which causes a heap-based overflow in the Write function in (c) Packet.h.
References 10 Total
- http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/BTPacket.cpp?r1=1.5&r2=1.5.4.1
- securityfocus.com: 16399 vdb-entry
- exchange.xforce.ibmcloud.com: shareaza-cpacket-bo(24344) vdb-entry
- securityreason.com: 382 third-party-advisory
- http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/EDPacket.cpp?r1=1.15&r2=1.15.2.1
- http://www.hustlelabs.com/shareaza_advisory.pdf
- archives.neohapsis.com: 20060126 Shareaza Remote Vulnerability mailing-list
- exchange.xforce.ibmcloud.com: shareaza-btpacket-bo(24342) vdb-entry
- securityfocus.com: 20060127 Shareaza P2P Remote Vulnerability mailing-list
- exchange.xforce.ibmcloud.com: shareaza-cedpacket-bo(24343) vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 10 Total
- http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/BTPacket.cpp?r1=1.5&r2=1.5.4.1 x_transferred
- securityfocus.com: 16399 vdb-entryx_transferred
- exchange.xforce.ibmcloud.com: shareaza-cpacket-bo(24344) vdb-entryx_transferred
- securityreason.com: 382 third-party-advisoryx_transferred
- http://cvs.sourceforge.net/viewcvs.py/shareaza/shareaza/EDPacket.cpp?r1=1.15&r2=1.15.2.1 x_transferred
- http://www.hustlelabs.com/shareaza_advisory.pdf x_transferred
- archives.neohapsis.com: 20060126 Shareaza Remote Vulnerability mailing-listx_transferred
- exchange.xforce.ibmcloud.com: shareaza-btpacket-bo(24342) vdb-entryx_transferred
- securityfocus.com: 20060127 Shareaza P2P Remote Vulnerability mailing-listx_transferred
- exchange.xforce.ibmcloud.com: shareaza-cedpacket-bo(24343) vdb-entryx_transferred