GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Nov 20, 2013 11:26 am Post subject: [ GLSA 201311-11 ] CTorrent: User-assisted arbitrary code ex |
|
|
Gentoo Linux Security Advisory
Title: CTorrent: User-assisted arbitrary code execution (GLSA 201311-11)
Severity: normal
Exploitable: remote
Date: November 20, 2013
Updated: November 22, 2013
Bug(s): #266953
ID: 201311-11
Synopsis
A stack-based buffer overflow in CTorrent might allow a remote
attacker to execute arbitrary code or cause a Denial of Service condition.
Background
CTorrent is a BitTorrent client implemented in C++ to be lightweight and
quick.
Affected Packages
Package: net-p2p/ctorrent
Vulnerable: < 3.3.2-r1
Unaffected: >= 3.3.2-r1
Architectures: All supported architectures
Description
CTorrent contains a stack-based buffer overflow in the
btFiles::BuildFromMI function in trunk/btfiles.cpp.
Impact
A remote attacker could entice a user to open a specially crafted
torrent file using CTorrent, possibly resulting in execution of arbitrary
code with the privileges of the process or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All CTorrent users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-p2p/ctorrent-3.3.2-r1"
|
References
CVE-2009-1759
Last edited by GLSA on Sat Nov 23, 2013 4:30 am; edited 1 time in total |
|