Joined: 12 May 2004
|Posted: Wed Nov 20, 2013 11:26 am Post subject: [ GLSA 201311-11 ] CTorrent: User-assisted arbitrary code ex
|Gentoo Linux Security Advisory
Title: CTorrent: User-assisted arbitrary code execution (GLSA 201311-11)
Date: November 20, 2013
Updated: November 22, 2013
A stack-based buffer overflow in CTorrent might allow a remote
attacker to execute arbitrary code or cause a Denial of Service condition.
CTorrent is a BitTorrent client implemented in C++ to be lightweight and
Vulnerable: < 3.3.2-r1
Unaffected: >= 3.3.2-r1
Architectures: All supported architectures
CTorrent contains a stack-based buffer overflow in the
btFiles::BuildFromMI function in trunk/btfiles.cpp.
A remote attacker could entice a user to open a specially crafted
torrent file using CTorrent, possibly resulting in execution of arbitrary
code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All CTorrent users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-p2p/ctorrent-3.3.2-r1"
Last edited by GLSA on Sat Nov 23, 2013 4:30 am; edited 1 time in total