Enhanced cTorrent -- stack-based overflow
cTorrent and dTorrent are prone to a remote buffer-overflow
vulnerability because the software fails to properly
bounds-check user-supplied input before copying it to an
insufficiently sized memory buffer.
Successful exploits allow remote attackers to execute
arbitrary machine code in the context of a vulnerable
application. Failed exploit attempts will likely result in
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright