Giuseppe Iuculano
2009-May-23 11:46 UTC
[Secure-testing-team] Bug#530255: CVE-2009-1759: Stack-based buffer overflow in the btFiles::BuildFromMI function
Package: ctorrent Severity: serious Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ctorrent. CVE-2009-1759[0]: | Stack-based buffer overflow in the btFiles::BuildFromMI function | (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and | probably earlier, and CTorrent 1.3.4, allows remote attackers to cause | a denial of service (crash) and possibly execute arbitrary code via a | Torrent file containing a long path. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1759 http://security-tracker.debian.net/tracker/CVE-2009-1759 Patch: http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkoX4iQACgkQNxpp46476apQSACfZnMhb5D7ovIaEjkDgY+PmMN9 yqsAoJ+5IkruLzc09YpQg0lWXQ30RGiz =hnC5 -----END PGP SIGNATURE-----