Detect the presence of Napster

Published: 2005-11-03 13:08:04

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Recommendations:
Filter this port if you do not want your network users to exchange MP3 files or if you fear that Napster may be used to transfer any non-mp3 file

Summary:
Napster is running on a remote computer. Napster is used to share MP3 across the network, and can be misused (by modifying the three first bytes of a target file) to transfer any file off a remote site.

Detection Type:
Remote Banner

Solution Type:
Mitigation

Severity
Medium
CVSS Score
5.0
Published
2005-11-03
Modified
2019-02-08
Category
Peer-To-Peer File Sharing

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.