cTorrent and dTorrent Torrent File Buffer Overflow Vulnerability

To exploit this issue, an attacker must entice an unsuspecting user to view a maliciously crafted '.torrent' file.

The following exploit code is available:


 

Privacy Statement
Copyright 2010, SecurityFocus