It is possible to cause a remote denial of service attack against Kazaa
Media Desktop v2.
If you can inject a malicous response for the automated ad download of
the client, you can cause a bufferoverflow and the denial of service. It
may be possible to run arbitary code with this vulnerability.
The easiest way to reproduce this behavior is deny all http connections
to hosts named *ad*. For example activate the "Block Sites" feature of
the NetGear FM114P and block the keyword "ad". After this change, every
time you start the vulnerable Kazaa client, the software crashes with
the typical windows error message during connection establishment.
Tested on Kazaa Media Desktop 2.0.2, Built Tuesday, November 05, 2002,
17:07:24 on Windows XP Professional with NetGear FM114P.
My bug report was sent on 03/01/27 to The Sharman Networks Team. Nothing
came back - Just the automated default reply.
Computer, Technik und Security http://www.computec.ch/
Meine private Webseite http://www.computec.ch/mruef/