Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Peer-To-Peer File Sharing >> Kazaa P2P check


Vulnerability Assessment Details

Kazaa P2P check

Vulnerability Assessment Summary
Acertains if the remote system is running Kazaa

Detailed Explanation for this Vulnerability Assessment

The remote server seems to be a Kazaa Peer-to-Peer client,
which may not be suitable for a business environment.

In addition, there is rumoured to be a remote exploit against Kazaa clients up to 2.0.2. While this has not been confirmed, the reporting sources are credible.

Solution : Uninstall this software
Network Security Threat Level: Low

Networks Security ID: 7680

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Security

Cables, Connectors

intel celeron E3400 2.6ghz (slgtz) lga775 processor
$3.0
intel celeron E3400 2.6ghz (slgtz) lga775 processor pictureAMD Athlon 64 3200& 2.0 GHz Processor (ADA3200DAA4BW)
$30.0
AMD Athlon 64 3200& 2.0 GHz Processor (ADA3200DAA4BW) pictureNetstal Sycap CPU 286 Card / Board 100.240.7771 DiskJet Injection Molder 600/11
$300.0
Netstal Sycap  CPU 286 Card / Board 100.240.7771 DiskJet Injection Molder 600/11 pictureIntel PII 266 MHz CPU Processor Chip 80522PX266512 512kb cache (SL2HE)
$21.38
Intel PII 266 MHz CPU Processor Chip 80522PX266512 512kb cache (SL2HE) picture


Discussions

No Discussions have been posted on this vulnerability.