[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [Full-disclosure] Shareaza Remote Vulnerability
- To: "Ryan Smith" <whatstheaddress@xxxxxxxxx>, <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: RE: [Full-disclosure] Shareaza Remote Vulnerability
- From: "Todd Towles" <toddtowles@xxxxxxxxxxxxxxx>
- Date: Thu, 26 Jan 2006 14:55:31 -0600
http://www.hustlelabs.com/shareaza_advisory.pdf
There you go...
> -----Original Message-----
> From: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
> [mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxxx] On Behalf
> Of Ryan Smith
> Sent: Thursday, January 26, 2006 10:56 AM
> To: full-disclosure@xxxxxxxxxxxxxxxxx
> Subject: [Full-disclosure] Shareaza Remote Vulnerability
>
> There is a vulnerability in the current version of Shareaza,
> a P2P file sharing product. It results in remote code
> execution. Please see the advisory for more details. There
> is no patch.
>
> Credit:
> These vulnerabilities were discovered and researched by Ryan Smith.
>
> Contact:
> WhatsTheAddress@xxxxxxxxx
>
> Details:
> http://www.hustlelabs.com/
> <http://www.security.nnov.ru/?gohttp://www.rem0te.com/public/i
> mages/clamav.pdf>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/