1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Kazaa Altnet ActiveX BO

HTTP Kazaa Altnet ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an attempt to exploit a buffer overflow vulnerability in Altnet Download Manager which may result in remote code execution.

Additional Information

Altnet is a peer-to-peer distributor of licensed digital entertainment and file-sharing applications. Altnet customers can use file-sharing utilities such as KaZaA and Grokster to download media files. KaZaA Media Desktop is a peer-to-peer file-sharing utility. KaZaA is available for the Microsoft Windows operating system. Grokster is a file-sharing application as well.

Altnet Download Manager ADM4 ActiveX control is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

This issue occurs when an excessive amount of data is passed to the 'Install()' method of 'adm4.dll'.

Attackers can exploit this issue to cause a denial-of-service condition or to execute arbitrary code.

This issue affects Altnet Download Manager 4.0; other versions may also be affected. KaZaA and Grokster are considered vulnerable as well.

Affected

  • This issue affects Altnet Download Manager 4.0; other versions may also be affected. KaZaA and Grokster are considered vulnerable as well.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube