Vulnerability Name:

CVE-2008-0364 (CCN-39719)

Assigned:2008-01-16
Published:2008-01-16
Updated:2018-10-15
Summary:Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Luigi Auriemma Advisories, 16 Jan 2008
Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5

Source: MISC
Type: Exploit
http://aluigi.altervista.org/adv/ruttorrent-adv.txt

Source: MISC
Type: UNKNOWN
http://aluigi.org/poc/ruttorrent.zip

Source: MITRE
Type: CNA
CVE-2008-0364

Source: CONFIRM
Type: UNKNOWN
http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt

Source: CONFIRM
Type: UNKNOWN
http://forum.utorrent.com/viewtopic.php?id=29330

Source: CCN
Type: SA28533
uTorrent Peer Client Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
28533

Source: CCN
Type: SA28537
BitTorrent Peer Client Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
28537

Source: SREASON
Type: UNKNOWN
3554

Source: CCN
Type: BitTorrent Web site
BitTorrent

Source: BUGTRAQ
Type: UNKNOWN
20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5

Source: BID
Type: Exploit, Patch
27321

Source: CCN
Type: BID-27321
BitTorrent and uTorrent Peers Window Remote Code Execution Vulnerability

Source: XF
Type: UNKNOWN
bittorrent-peers-bo(39719)

Source: XF
Type: UNKNOWN
bittorrent-peers-bo(39719)

Source: XF
Type: UNKNOWN
utorrent-peers-bo(39720)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:bittorrent:bittorrent:*:*:*:*:*:*:*:* (Version <= 6.0)
  • OR cpe:/a:utorrent:utorrent:*:*:*:*:*:*:*:* (Version <= 1.7.5)
  • OR cpe:/a:utorrent:utorrent:1.8-alpha-7834:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2008-0364 (CCN-39720)

    Assigned:2008-01-16
    Published:2008-01-16
    Updated:2008-01-16
    Summary:uTorrent is vulnerable to a buffer overflow, caused by improper bounds checking of unicode strings. By sending a specially-crafted packet to a client, a remote attacker could overflow a buffer and cause the application to crash when peer details are viewed.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
    3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: Luigi Auriemma Advisories, 16 Jan 2008
    Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5

    Source: MITRE
    Type: CNA
    CVE-2008-0364

    Source: CCN
    Type: SA28533
    uTorrent Peer Client Buffer Overflow Vulnerability

    Source: CCN
    Type: SA28537
    BitTorrent Peer Client Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-27321
    BitTorrent and uTorrent Peers Window Remote Code Execution Vulnerability

    Source: CCN
    Type: uTorrent Web site
    uTorrent

    Source: XF
    Type: UNKNOWN
    utorrent-peers-bo(39720)

    Vulnerability Name:

    CVE-2008-0364 (CCN-39753)

    Assigned:2008-01-15
    Published:2008-01-15
    Updated:2018-10-15
    Summary:Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
    7.8 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-119
    Vulnerability Consequences:Informational
    References:Source: MITRE
    Type: CNA
    CVE-2008-0339

    Source: MITRE
    Type: CNA
    CVE-2008-0340

    Source: MITRE
    Type: CNA
    CVE-2008-0341

    Source: MITRE
    Type: CNA
    CVE-2008-0342

    Source: MITRE
    Type: CNA
    CVE-2008-0343

    Source: MITRE
    Type: CNA
    CVE-2008-0344

    Source: MITRE
    Type: CNA
    CVE-2008-0345

    Source: MITRE
    Type: CNA
    CVE-2008-0346

    Source: MITRE
    Type: CNA
    CVE-2008-0347

    Source: MITRE
    Type: CNA
    CVE-2008-0349

    Source: MITRE
    Type: CNA
    CVE-2008-0364

    Source: CCN
    Type: SA28518
    Oracle Products Multiple Vulnerabilities

    Source: CCN
    Type: SA28556
    HP Oracle for OpenView Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1019218
    Oracle Database and Other Products Have Unspecified Vulnerabilities With Unspecified Impact

    Source: CCN
    Type: Oracle Critical Patch Update - January 2008
    Oracle Critical Patch Update Advisory - January 2008

    Source: CCN
    Type: BID-27229
    Oracle January 2008 Critical Patch Update Multiple Vulnerabilities

    Source: XF
    Type: UNKNOWN
    oracle-cpu-jan-2008(39753)

    Source: CCN
    Type: IBM Internet Security Systems X-Force Database
    Oracle Database XML DB component unspecified privilege escalation

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:10.1.2.0.2:r2:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:10.1.0.5:r1:*:*:*:*:*:*
  • OR cpe:/a:oracle:collaboration_suite:10.1.2:r1:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:10.2.0.2:r2:*:*:*:*:*:*
  • OR cpe:/a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.22:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.48:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:9.2.0.8:r2:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:10.2.0.3:r2:*:*:*:*:*:*
  • OR cpe:/a:oracle:e-business_suite:12.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:9.0.1.5::fips+:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:9.2.0.8dv:r2:*:*:*:*:*:*
  • OR cpe:/a:oracle:e-business_suite:12.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:e-business_suite:12.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:database_server:11.1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:e-business_suite:12.0.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    bittorrent bittorrent *
    utorrent utorrent *
    utorrent utorrent 1.8-alpha-7834
    bittorrent bittorrent 6.0
    oracle application server 1.0.2.2
    oracle application server 10.1.2.0.2 r2
    oracle database server 10.1.0.5 r1
    oracle collaboration suite 10.1.2 r1
    oracle database server 10.2.0.2 r2
    oracle application server 9.0.4.3
    oracle peoplesoft enterprise peopletools 8.22
    oracle peoplesoft enterprise peopletools 8.48
    oracle database server 9.2.0.8 r2
    oracle database server 10.2.0.3 r2
    oracle e-business suite 12.0.0
    oracle database server 9.0.1.5
    oracle database server 9.2.0.8dv r2
    oracle e-business suite 12.0.1
    oracle peoplesoft enterprise peopletools 8.49
    oracle e-business suite 12.0.2
    oracle database server 11.1.0.6
    oracle e-business suite 11.5.10.2
    oracle e-business suite 12.0.3