CTorrent/Enhanced CTorrent Buffer Overflow Vulnerability

Summary
The host is installed with CTorrent/Enhanced CTorrent and is prone to Buffer Overflow Vulnerability.
Impact
Attackers can exploit this issue by execute arbitrary code via specially crafted torrent files and can cause denial of service. Impact Level: System/Application
Solution
Apply the appropriate patch from the below link, http://sourceforge.net/p/dtorrent/bugs/14/ http://sourceforge.net/p/dtorrent/code/HEAD/tree
Insight
A stack based buffer overflow is due to a boundary error within the function 'btFiles::BuildFromMI()' in btfiles.cpp while processing torrent files containing a long path.
Affected
CTorrent version 1.3.4 on Linux. Enhanced CTorrent version 3.3.2 and prior on Linux.
References