![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.900557 |
Categoría: | Buffer overflow |
Título: | CTorrent/Enhanced CTorrent Buffer Overflow Vulnerability |
Resumen: | CTorrent/Enhanced CTorrent is prone to a Buffer Overflow Vulnerability. |
Descripción: | Summary: CTorrent/Enhanced CTorrent is prone to a Buffer Overflow Vulnerability. Vulnerability Insight: A stack based buffer overflow is due to a boundary error within the function 'btFiles::BuildFromMI()' in btfiles.cpp while processing torrent files containing a long path. Vulnerability Impact: Attackers can exploit this issue by execute arbitrary code via specially crafted torrent files and can cause denial of service. Affected Software/OS: CTorrent version 1.3.4 on Linux. Enhanced CTorrent version 3.3.2 and prior on Linux. Solution: Apply the appropriate patch. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1759 BugTraq ID: 34584 http://www.securityfocus.com/bid/34584 Debian Security Information: DSA-1817 (Google Search) http://www.debian.org/security/2009/dsa-1817 https://www.exploit-db.com/exploits/8470 https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01010.html https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01102.html http://www.openwall.com/lists/oss-security/2009/05/20/3 http://secunia.com/advisories/34752 http://secunia.com/advisories/35499 http://secunia.com/advisories/36471 http://www.vupen.com/english/advisories/2009/1092 XForce ISS Database: ctorrent-btfiles-bo(49959) https://exchange.xforce.ibmcloud.com/vulnerabilities/49959 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |