The host is installed with CTorrent/Enhanced CTorrent and is prone to Buffer Overflow Vulnerability.
Attackers can exploit this issue by execute arbitrary code via specially crafted torrent files and can cause denial of service. Impact Level: System/Application
Apply the appropriate patch from the below link, http://sourceforge.net/p/dtorrent/bugs/14/ http://sourceforge.net/p/dtorrent/code/HEAD/tree
A stack based buffer overflow is due to a boundary error within the function 'btFiles::BuildFromMI()' in btfiles.cpp while processing torrent files containing a long path.
CTorrent version 1.3.4 on Linux. Enhanced CTorrent version 3.3.2 and prior on Linux.