9.3
CVSSv2

CVE-2008-4434

Published: 03/10/2008 Updated: 08/08/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and previous versions and (2) BitTorrent 6.0.3 build 8642 and previous versions allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.

Vulnerable Product Search on Vulmon Subscribe to Product

utorrent utorrent 1.1.3

utorrent utorrent 1.2.2

utorrent utorrent 1.4.2

utorrent utorrent 1.7.4

utorrent utorrent 1.2

utorrent utorrent 1.1.7

utorrent utorrent 1.7.1

utorrent utorrent 1.7

utorrent utorrent 1.7.5

utorrent utorrent 1.7.6

utorrent utorrent 1.1.1

utorrent utorrent 1.1.5

utorrent utorrent 1.5

utorrent utorrent 1.6

utorrent utorrent

utorrent utorrent 1.1.4

utorrent utorrent 1.1.6

utorrent utorrent 1.2.1

utorrent utorrent 1.7.2

utorrent utorrent 1.7.3

utorrent utorrent 1.4

utorrent utorrent 1.3

bittorrent bittorrent 4.1.2

bittorrent bittorrent 4.1.1

bittorrent bittorrent 4.2.1

bittorrent bittorrent 4.2.0

bittorrent bittorrent 4.3.5

bittorrent bittorrent 4.3.6

bittorrent bittorrent 4.4.0

bittorrent bittorrent 4.9.7

bittorrent bittorrent 4.9.8

bittorrent bittorrent 4.0.1

bittorrent bittorrent 3.9.1

bittorrent bittorrent 4.1.6

bittorrent bittorrent 4.1.5

bittorrent bittorrent 4.3.0

bittorrent bittorrent 4.3.2

bittorrent bittorrent 4.9.3

bittorrent bittorrent 4.9.4

bittorrent bittorrent 4.20.1

bittorrent bittorrent 6.0.1

bittorrent bittorrent 4.0.2

bittorrent bittorrent 4.0.3

bittorrent bittorrent 4.20.2

bittorrent bittorrent 5.0.0

bittorrent bittorrent 4.22.1

bittorrent bittorrent 5.0.6

bittorrent bittorrent 5.0.9

bittorrent bittorrent 5.2.0

bittorrent bittorrent 5.0.8

bittorrent bittorrent 4.1.8

bittorrent bittorrent 4.1.7

bittorrent bittorrent 4.3.3

bittorrent bittorrent 4.3.4

bittorrent bittorrent 4.9.5

bittorrent bittorrent 4.9.6

bittorrent bittorrent 6.0

bittorrent bittorrent 4.0.0

bittorrent bittorrent 4.22.0

bittorrent bittorrent 4.20.9

bittorrent bittorrent 4.20.8

bittorrent bittorrent 4.27.2

bittorrent bittorrent 4.27.1

bittorrent bittorrent 5.0.7

bittorrent bittorrent 5.0.5

bittorrent bittorrent 6.0.2

bittorrent bittorrent

bittorrent bittorrent 4.20.7

bittorrent bittorrent 4.20.6

bittorrent bittorrent 4.26.0

bittorrent bittorrent 4.24.2

bittorrent bittorrent 5.0.3

bittorrent bittorrent 5.0.4

bittorrent bittorrent 4.1.4

bittorrent bittorrent 4.1.3

bittorrent bittorrent 4.2.2

bittorrent bittorrent 4.3.1

bittorrent bittorrent 4.4.1

bittorrent bittorrent 4.9.2

bittorrent bittorrent 4.9.9

bittorrent bittorrent 4.20.0

bittorrent bittorrent 4.0.4

bittorrent bittorrent 4.1.0

bittorrent bittorrent 4.20.4

bittorrent bittorrent 4.20.3

bittorrent bittorrent 4.24.0

bittorrent bittorrent 4.22.4

bittorrent bittorrent 5.0.1

bittorrent bittorrent 5.0.2

Vendor Advisories

Debian Bug report logs - #501443 dbus: CVE-2008-3834, possible DoS Package: dbus; Maintainer for dbus is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Source for dbus is src:dbus (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Tue, 7 Oct 2008 12:03:0 ...

Exploits

#!/usr/bin/perl # BitTorrent 603 torrent File Stack Buffer Overflow Exploit # 09/21/2008 by k`sOSe && oVeret use warnings; use strict; # If you change this(avoid \x80->\x9f unless you really know what you are doing) you must also change the length value of the decoder my $shellcode = # windows/exec CMD="C:\WINDOWS\system32\calc ...