Vulnerability Name: | CVE-2008-0364 (CCN-39719) | ||||||||
Assigned: | 2008-01-16 | ||||||||
Published: | 2008-01-16 | ||||||||
Updated: | 2018-10-15 | ||||||||
Summary: | Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: Luigi Auriemma Advisories, 16 Jan 2008 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5 Source: MISC Type: Exploit http://aluigi.altervista.org/adv/ruttorrent-adv.txt Source: MISC Type: UNKNOWN http://aluigi.org/poc/ruttorrent.zip Source: MITRE Type: CNA CVE-2008-0364 Source: CONFIRM Type: UNKNOWN http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt Source: CONFIRM Type: UNKNOWN http://forum.utorrent.com/viewtopic.php?id=29330 Source: CCN Type: SA28533 uTorrent Peer Client Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 28533 Source: CCN Type: SA28537 BitTorrent Peer Client Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 28537 Source: SREASON Type: UNKNOWN 3554 Source: CCN Type: BitTorrent Web site BitTorrent Source: BUGTRAQ Type: UNKNOWN 20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5 Source: BID Type: Exploit, Patch 27321 Source: CCN Type: BID-27321 BitTorrent and uTorrent Peers Window Remote Code Execution Vulnerability Source: XF Type: UNKNOWN bittorrent-peers-bo(39719) Source: XF Type: UNKNOWN bittorrent-peers-bo(39719) Source: XF Type: UNKNOWN utorrent-peers-bo(39720) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2008-0364 (CCN-39720) | ||||||||
Assigned: | 2008-01-16 | ||||||||
Published: | 2008-01-16 | ||||||||
Updated: | 2008-01-16 | ||||||||
Summary: | uTorrent is vulnerable to a buffer overflow, caused by improper bounds checking of unicode strings. By sending a specially-crafted packet to a client, a remote attacker could overflow a buffer and cause the application to crash when peer details are viewed. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: Luigi Auriemma Advisories, 16 Jan 2008 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5 Source: MITRE Type: CNA CVE-2008-0364 Source: CCN Type: SA28533 uTorrent Peer Client Buffer Overflow Vulnerability Source: CCN Type: SA28537 BitTorrent Peer Client Buffer Overflow Vulnerability Source: CCN Type: BID-27321 BitTorrent and uTorrent Peers Window Remote Code Execution Vulnerability Source: CCN Type: uTorrent Web site uTorrent Source: XF Type: UNKNOWN utorrent-peers-bo(39720) | ||||||||
Vulnerability Name: | CVE-2008-0364 (CCN-39753) | ||||||||
Assigned: | 2008-01-15 | ||||||||
Published: | 2008-01-15 | ||||||||
Updated: | 2018-10-15 | ||||||||
Summary: | Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.9 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
7.8 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Informational | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-0339 Source: MITRE Type: CNA CVE-2008-0340 Source: MITRE Type: CNA CVE-2008-0341 Source: MITRE Type: CNA CVE-2008-0342 Source: MITRE Type: CNA CVE-2008-0343 Source: MITRE Type: CNA CVE-2008-0344 Source: MITRE Type: CNA CVE-2008-0345 Source: MITRE Type: CNA CVE-2008-0346 Source: MITRE Type: CNA CVE-2008-0347 Source: MITRE Type: CNA CVE-2008-0349 Source: MITRE Type: CNA CVE-2008-0364 Source: CCN Type: SA28518 Oracle Products Multiple Vulnerabilities Source: CCN Type: SA28556 HP Oracle for OpenView Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1019218 Oracle Database and Other Products Have Unspecified Vulnerabilities With Unspecified Impact Source: CCN Type: Oracle Critical Patch Update - January 2008 Oracle Critical Patch Update Advisory - January 2008 Source: CCN Type: BID-27229 Oracle January 2008 Critical Patch Update Multiple Vulnerabilities Source: XF Type: UNKNOWN oracle-cpu-jan-2008(39753) Source: CCN Type: IBM Internet Security Systems X-Force Database Oracle Database XML DB component unspecified privilege escalation | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |