oss-sec mailing list archives
Re: CVE request: ctorrent
From: "Steven M. Christey" <coley () linus mitre org>
Date: Thu, 21 May 2009 20:22:21 -0400 (EDT)
====================================================== Name: CVE-2009-1759 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1759 Reference: MILW0RM:8470 Reference: URL:http://www.milw0rm.com/exploits/8470 Reference: MLIST:[oss-security] 20090520 CVE request: ctorrent Reference: URL:http://www.openwall.com/lists/oss-security/2009/05/20/3 Reference: CONFIRM:http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch Reference: CONFIRM:http://sourceforge.net/tracker/?func=detail&aid=2782875&group_id=202532&atid=981959 Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=501813 Reference: BID:34584 Reference: URL:http://www.securityfocus.com/bid/34584 Reference: SECUNIA:34752 Reference: URL:http://secunia.com/advisories/34752 Reference: VUPEN:ADV-2009-1092 Reference: URL:http://www.vupen.com/english/advisories/2009/1092 Reference: XF:ctorrent-btfiles-bo(49959) Reference: URL:http://xforce.iss.net/xforce/xfdb/49959 Stack-based buffer overflow in the btFiles::BuildFromMI function (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and probably earlier, and CTorrent 1.3.4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Torrent file containing a long path.
Current thread:
- CVE request: ctorrent Vincent Danen (May 20)
- Re: CVE request: ctorrent Steven M. Christey (May 21)