Vulnerability CVE-2009-1759


Published: 2009-05-22   Modified: 2012-02-13

Description:
Stack-based buffer overflow in the btFiles::BuildFromMI function (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and probably earlier, and CTorrent 1.3.4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Torrent file containing a long path.

See advisories in our WLB2 database:
Topic
Author
Date
High
cTorrent/DTorrent (.Torrent File) Buffer Overflow PoC
Michael Brooks
24.05.2009

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Rahul -> Ctorrent 
Rahul -> Dtorrent 

 References:
http://www.securityfocus.com/bid/34584
http://www.openwall.com/lists/oss-security/2009/05/20/3
http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01102.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01010.html
https://bugzilla.redhat.com/show_bug.cgi?id=501813
http://xforce.iss.net/xforce/xfdb/49959
http://www.vupen.com/english/advisories/2009/1092
http://www.milw0rm.com/exploits/8470
http://www.debian.org/security/2009/dsa-1817
http://sourceforge.net/tracker/?func=detail&aid=2782875&group_id=202532&atid=981959
http://secunia.com/advisories/36471
http://secunia.com/advisories/35499
http://secunia.com/advisories/34752

Copyright 2024, cxsecurity.com

 

Back to Top