blob: 505a74f25071189830865ba78bc95aaaa9d4eedf [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200705-01">
<title>Ktorrent: Multiple vulnerabilities</title>
Multiple vulnerabilities have been discovered in Ktorrent allowing for the
remote execution of arbitrary code and a Denial of Service.
<product type="ebuild">ktorrent</product>
<announced>May 01, 2007</announced>
<revised>May 01, 2007: 01</revised>
<package name="net-p2p/ktorrent" auto="yes" arch="*">
<unaffected range="ge">2.1.3</unaffected>
<vulnerable range="lt">2.1.3</vulnerable>
Ktorrent is a Bittorrent client for KDE.
Bryan Burns of Juniper Networks discovered a vulnerability in
chunkcounter.cpp when processing large or negative idx values, and a
directory traversal vulnerability in torrent.cpp.
<impact type="normal">
A remote attacker could entice a user to download a specially crafted
torrent file, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running Ktorrent.
There is no known workaround at this time.
All Ktorrent users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-p2p/ktorrent-2.1.3&quot;</code>
<uri link="">CVE-2007-1384</uri>
<uri link="">CVE-2007-1385</uri>
<uri link="">CVE-2007-1799</uri>
<metadata tag="requester" timestamp="Tue, 24 Apr 2007 19:42:10 +0000">
<metadata tag="submitter" timestamp="Thu, 26 Apr 2007 07:58:35 +0000">
<metadata tag="bugReady" timestamp="Thu, 26 Apr 2007 07:59:01 +0000">