Bug 501813 (CVE-2009-1759)

Summary: CVE-2009-1759 ctorrent: stack-based buffer overflow vulnerability
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dominik
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-09-14 15:41:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vincent Danen 2009-05-20 20:08:36 UTC
A boundary error flaw was found in Enhanced CTorrent that could be exploited to cause a stack-based buffer overflow if a user were to open a specially crafted torrent file.  This could lead to an application crash or, possibly, the execution of arbitrary code as the user running ctorrent.  This issue was found in version 3.3.2 and probably affects older versions.  It will be fixed in the forthcoming 3.3.3 release (already fixed in svn).  This overflow is aborted in Fedora due to SSP protections.

References:

http://secunia.com/advisories/34752/
http://bugs.gentoo.org/show_bug.cgi?id=266953
http://sourceforge.net/tracker/?func=detail&aid=2782875&group_id=202532&atid=981959
http://milw0rm.com/exploits/8470

The upstream commit to fix the issue:

http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch

Comment 1 Vincent Danen 2009-05-22 03:15:22 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1759 to
the following vulnerability:

Name: CVE-2009-1759
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1759
Reference: MILW0RM:8470
Reference: URL: http://www.milw0rm.com/exploits/8470
Reference: MLIST:[oss-security] 20090520 CVE request: ctorrent
Reference: URL: http://www.openwall.com/lists/oss-security/2009/05/20/3
Reference: CONFIRM: http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch
Reference: CONFIRM: http://sourceforge.net/tracker/?func=detail&aid=2782875&group_id=202532&atid=981959
Reference: CONFIRM: https://bugzilla.redhat.com/show_bug.cgi?id=501813
Reference: BID:34584
Reference: URL: http://www.securityfocus.com/bid/34584
Reference: SECUNIA:34752
Reference: URL: http://secunia.com/advisories/34752
Reference: VUPEN:ADV-2009-1092
Reference: URL: http://www.vupen.com/english/advisories/2009/1092
Reference: XF:ctorrent-btfiles-bo(49959)
Reference: URL: http://xforce.iss.net/xforce/xfdb/49959

Stack-based buffer overflow in the btFiles::BuildFromMI function
(trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and
probably earlier, and CTorrent 1.3.4, allows remote attackers to cause
a denial of service (crash) and possibly execute arbitrary code via a
Torrent file containing a long path.

Comment 2 Fedora Update System 2009-08-22 14:15:38 UTC
ctorrent-1.3.4-10.dnh3.3.2.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/ctorrent-1.3.4-10.dnh3.3.2.fc11

Comment 3 Fedora Update System 2009-08-22 14:17:41 UTC
ctorrent-1.3.4-7.dnh3.3.2.fc10 has been submitted as an update for Fedora 10.
http://admin.fedoraproject.org/updates/ctorrent-1.3.4-7.dnh3.3.2.fc10

Comment 4 Fedora Update System 2009-08-22 15:38:04 UTC
ctorrent-1.3.4-4.dnh3.3.2.el5 has been submitted as an update for Fedora EPEL 5.
http://admin.fedoraproject.org/updates/ctorrent-1.3.4-4.dnh3.3.2.el5

Comment 5 Fedora Update System 2009-08-22 15:39:13 UTC
ctorrent-1.3.4-5.dnh2.1.el5 has been submitted as an update for Fedora EPEL 5.
http://admin.fedoraproject.org/updates/ctorrent-1.3.4-5.dnh2.1.el5

Comment 6 Fedora Update System 2009-08-25 04:26:53 UTC
ctorrent-1.3.4-10.dnh3.3.2.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2009-08-25 04:41:52 UTC
ctorrent-1.3.4-7.dnh3.3.2.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2009-09-12 17:55:44 UTC
ctorrent-1.3.4-5.dnh2.1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.