Search criteria

18 vulnerabilities found for bittorrent by bittorrent

FKIE_CVE-2015-5474

Vulnerability from fkie_nvd - Published: 2015-08-13 14:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Impacted products
Vendor Product Version
bittorrent bittorrent *
utorrent utorrent *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42011BE2-9BB4-406D-A427-17CBF5E080CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE06C3AD-A9FA-4275-9457-9AA0B6EC0FA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad en BitTorrent y uTorrent, permite a atacantes remotos inyectar par\u00e1metros de l\u00ednea de comandos y ejecutar comandos arbitrarios a trav\u00e9s de una URL manipulada utilizando el protocolo (1) bittorrent o (2) magnet."
    }
  ],
  "id": "CVE-2015-5474",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2015-08-13T14:59:06.283",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-8515

Vulnerability from fkie_nvd - Published: 2014-12-12 15:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
Impacted products
Vendor Product Version
bittorrent bittorrent *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42011BE2-9BB4-406D-A427-17CBF5E080CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000."
    },
    {
      "lang": "es",
      "value": "La interfaz web en BitTorrent permite a atacantes remotos ejecutar comandos arbitrarios mediante el aprovechamiento del conocimiento de valores de emparejamiento y una solicitud manipulada al puerto 10000."
    }
  ],
  "id": "CVE-2014-8515",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-12-12T15:59:11.977",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-7166

Vulnerability from fkie_nvd - Published: 2009-09-04 10:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
Impacted products
Vendor Product Version
bittorrent bittorrent *
bittorrent bittorrent 3.9.1
bittorrent bittorrent 4.0.0
bittorrent bittorrent 4.0.1
bittorrent bittorrent 4.0.2
bittorrent bittorrent 4.0.3
bittorrent bittorrent 4.0.4
bittorrent bittorrent 4.1.0
bittorrent bittorrent 4.1.1
bittorrent bittorrent 4.1.2
bittorrent bittorrent 4.1.3
bittorrent bittorrent 4.1.4
bittorrent bittorrent 4.1.5
bittorrent bittorrent 4.1.6
bittorrent bittorrent 4.1.7
bittorrent bittorrent 4.1.8
bittorrent bittorrent 4.2.0
bittorrent bittorrent 4.2.1
bittorrent bittorrent 4.2.2
bittorrent bittorrent 4.3.0
bittorrent bittorrent 4.3.1
bittorrent bittorrent 4.3.2
bittorrent bittorrent 4.3.3
bittorrent bittorrent 4.3.4
bittorrent bittorrent 4.3.5
bittorrent bittorrent 4.3.6
bittorrent bittorrent 4.4.0
bittorrent bittorrent 4.4.1
bittorrent bittorrent 4.9.2
bittorrent bittorrent 4.9.3
bittorrent bittorrent 4.9.4
bittorrent bittorrent 4.9.5
bittorrent bittorrent 4.9.6
bittorrent bittorrent 4.9.7
bittorrent bittorrent 4.9.8
bittorrent bittorrent 4.9.9
bittorrent bittorrent 4.20.0
bittorrent bittorrent 4.20.1
bittorrent bittorrent 4.20.2
bittorrent bittorrent 4.20.3
bittorrent bittorrent 4.20.4
bittorrent bittorrent 4.20.6
bittorrent bittorrent 4.20.7
bittorrent bittorrent 4.20.8
bittorrent bittorrent 4.20.9
bittorrent bittorrent 4.22.0
bittorrent bittorrent 4.22.1
bittorrent bittorrent 4.22.4
bittorrent bittorrent 4.24.0
bittorrent bittorrent 4.24.2
bittorrent bittorrent 4.26.0
bittorrent bittorrent 4.27.1
bittorrent bittorrent 4.27.2
bittorrent bittorrent 5.0.0
bittorrent bittorrent 5.0.1
bittorrent bittorrent 5.0.2
bittorrent bittorrent 5.0.3
bittorrent bittorrent 5.0.4
bittorrent bittorrent 5.0.5
bittorrent bittorrent 5.0.6
bittorrent bittorrent 5.0.7
bittorrent bittorrent 5.0.8
bittorrent bittorrent 5.0.9
bittorrent bittorrent 5.2.0
bittorrent bittorrent 6.0
utorrent utorrent *
utorrent utorrent 1.1.1
utorrent utorrent 1.1.3
utorrent utorrent 1.1.4
utorrent utorrent 1.1.5
utorrent utorrent 1.1.6
utorrent utorrent 1.1.7
utorrent utorrent 1.2
utorrent utorrent 1.2.1
utorrent utorrent 1.2.2
utorrent utorrent 1.3
utorrent utorrent 1.4
utorrent utorrent 1.4.2
utorrent utorrent 1.5
utorrent utorrent 1.6
utorrent utorrent 1.7
utorrent utorrent 1.7.1
utorrent utorrent 1.7.2
utorrent utorrent 1.7.3
utorrent utorrent 1.7.4
utorrent utorrent 1.7.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26B450D4-2DD6-42EA-8F98-68CD643AFD17",
              "versionEndIncluding": "6.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3628182-3D58-4555-9DFF-1921CA3C54F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FDECB8-8713-4D37-A0DB-E2FB5D3A16DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF04516-5372-4D39-A58A-E0840E99C9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738167A5-9052-4ABA-843B-D5DC2DD0EAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3687F7-A1DC-4AB1-91F2-60C2639A3146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "946E1E70-E472-4C8F-BDE9-63E952F1AD41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2183E7-8338-4CE5-9D10-85E623BC50AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DE484A-930E-40CE-8FC7-25C32D94DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D7B8AC-D171-413B-B1DF-82484A4C4B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "23512725-DA47-47F9-8081-2B0A74471DBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "168AAA79-E82A-426B-ABAB-C62FA18D757E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E21B17B-EA03-4B0A-B944-E869994E596E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5D0343-9AD0-4F1D-ACDA-20BDD76F6EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43485B34-530E-4A80-8C39-3A751E8090B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "184686B8-37F7-43F7-AFAD-4B92946424C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "22BD68CE-00DD-457E-8195-96670270D543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D822D5A-F3C2-4726-9A87-B3AEC6A7D2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B5B235-6BE8-477B-B7D1-21FF14541391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34604F10-6D7A-48D3-9761-5907B1511018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6EC9CC-538E-4F44-B065-9C0B7AD9F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EABCAD8-2455-4817-8352-E1C99D6031C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BAAD599-5C89-48FA-99F3-1EFE5D491E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BB8DB0-1342-4D49-9883-3C853FBD858A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DA8E4C7-A501-4506-9D47-4CB75EE23459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73653253-EEDA-410E-B7F0-3A6997F4CCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6F507B-8AEC-488F-879C-73EDB63E72B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08D41D8-E7F7-4F78-BA39-F480C1327C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E190768-A30C-473A-ABF2-9306C2807918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C5230C8-4BCF-4366-A925-9A282DD9537F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "211C4C3B-0587-45BE-819E-51426E849A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75C68D1-F42F-4B49-9C26-767E7285001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE28509-8681-4875-B3F2-6CB89FB31B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9FCE5F-1B0F-4A33-98EB-FC3F0CDE2EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "437FACF4-0016-4E00-AFD8-0C4D32EEBF73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A196C475-C350-462F-8B20-29FA403BAC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED97A72-801C-40EB-AE70-FAC1A4593BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E091CB-F105-4032-B6CE-E2AB5098B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AF7BB-E734-45D0-A82A-A66C212296A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0E7BF1-5C10-469A-BB85-F83B0348B0DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54685CE2-734E-4DD2-92E5-D170C9AC8C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B3E9A7-759A-474B-B5A2-77336D010F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBF44AF-C4F1-4EF8-BFCD-6E43FEA76FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "826E9D27-A316-4A99-AAD0-C73A8E81513E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4E9832-90DA-4D4F-A7F5-EDC118EC85B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51155C5E-5394-4015-9ECE-CA7B63EA4C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C216CC0F-4AB7-4CAA-A44B-EE83500F0C7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCBFEB7-419A-468D-BA8C-5FBDEE7D1C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "122BCB78-104C-48B1-B0AF-BA9E1DBAC496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74325695-412A-465E-8278-AEA222354A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "112ACDDE-7742-4D7A-BA03-FE50ADF8ED02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "751E51E0-F2B9-4FB2-97C1-1D7EC3F9A6A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E6EF53-6DC8-49C5-9125-BC32CA644131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BAEFBC6-5B93-4C44-AD87-7946367AF740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F393E6B-6576-4671-8311-3B64EDAB621F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898F4B04-1329-4442-A01B-BAF47549E3E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6715F83C-7928-41CE-AB4D-7B855C3038B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865DE2B-0BDF-4120-BD0C-408518F84286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC8D79A-3A04-4E26-8EDD-7A07F3EF5D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA4DD9D-E3C9-4818-BB2C-9F4A86F65216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "153A361C-691C-4126-9FE5-EC964437F1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6395ECE-34FF-43D3-9DDA-0503B06F08E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D7B594F-AB4B-4C92-BFFD-CD55C5FB2393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "696B8F10-DCCB-41F5-B771-3B8EF8DD33B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FFA73B3-9FA6-4026-A59E-3EBBE3CDFBCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33159FF-D7D2-4304-89B5-357496BB8E52",
              "versionEndIncluding": "1.7.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F133D6CF-1F5C-4DA9-AD2B-A0EBD3F8783F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BE1497-6C95-41B3-861D-318B79C0BD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD2577B-7D73-414F-ABD9-99B8DB77277A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A91C32-D05F-459B-8CF1-BC965610F70F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4258E9-055A-4079-917B-B1C9680816FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64611E61-2728-437C-B35C-B104C0828A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD9058B-A162-466A-95F9-3FC1BB6838D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F63991-BFBD-4C52-B87F-DD59F4974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2148FDA-313B-4603-A89C-EDE7E41A31C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1A8AD9-50CD-4254-9A54-E439EC4B11AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "068F4B69-E6C1-4DA9-9EEB-EECB6899B3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4950A28-EB7F-4991-86E4-CDC4FA381ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "36CE40C8-0FB1-4656-9BAD-155B4409FE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "18259FA6-04B8-4C50-B74C-306F59DC090B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A643D2C-DFEC-4A98-8B56-C4B9511F65C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9D1773-3FCB-4D0C-A837-7D3B9ABA7B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B47FF8-885A-4509-B259-447EBDE79831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "01788873-AAB2-464E-B564-0E0EA62078E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E3BDC4-9B81-4D5C-897E-793173F973FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC998099-553A-4719-A903-0C67EC0D23DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header.  NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la interfaz web en BitTorrent v6.0.1 (build 7859) y anteriores, y uTorrent v1.7.6 (build 7859) y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda) a trav\u00e9s de una cabecera Range manipulada. NOTA: esta vulnerabilidad es probablemente diferente que CVE-2008-0071 y CVE-2008-0364."
    }
  ],
  "id": "CVE-2008-7166",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-04T10:30:01.890",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42825"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42826"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28686"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28695"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0326"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0327"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-4434

Vulnerability from fkie_nvd - Published: 2008-10-03 22:22 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.
References
cve@mitre.orghttp://forum.utorrent.com/viewtopic.php?id=44003
cve@mitre.orghttp://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf
cve@mitre.orghttp://seclists.org/dailydave/2008/q3/0155.html
cve@mitre.orghttp://secunia.com/advisories/31441Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31445Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/30653
cve@mitre.orghttp://www.securitytracker.com/id?1020664
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2340
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2341
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44404
af854a3a-2127-422b-91ae-364da2661108http://forum.utorrent.com/viewtopic.php?id=44003
af854a3a-2127-422b-91ae-364da2661108http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/dailydave/2008/q3/0155.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31441Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31445Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30653
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020664
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2340
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2341
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44404
Impacted products
Vendor Product Version
utorrent utorrent *
utorrent utorrent 1.1.1
utorrent utorrent 1.1.3
utorrent utorrent 1.1.4
utorrent utorrent 1.1.5
utorrent utorrent 1.1.6
utorrent utorrent 1.1.7
utorrent utorrent 1.2
utorrent utorrent 1.2.1
utorrent utorrent 1.2.2
utorrent utorrent 1.3
utorrent utorrent 1.4
utorrent utorrent 1.4.2
utorrent utorrent 1.5
utorrent utorrent 1.6
utorrent utorrent 1.7
utorrent utorrent 1.7.1
utorrent utorrent 1.7.2
utorrent utorrent 1.7.3
utorrent utorrent 1.7.4
utorrent utorrent 1.7.5
utorrent utorrent 1.7.6
bittorrent bittorrent *
bittorrent bittorrent 3.9.1
bittorrent bittorrent 4.0.0
bittorrent bittorrent 4.0.1
bittorrent bittorrent 4.0.2
bittorrent bittorrent 4.0.3
bittorrent bittorrent 4.0.4
bittorrent bittorrent 4.1.0
bittorrent bittorrent 4.1.1
bittorrent bittorrent 4.1.2
bittorrent bittorrent 4.1.3
bittorrent bittorrent 4.1.4
bittorrent bittorrent 4.1.5
bittorrent bittorrent 4.1.6
bittorrent bittorrent 4.1.7
bittorrent bittorrent 4.1.8
bittorrent bittorrent 4.2.0
bittorrent bittorrent 4.2.1
bittorrent bittorrent 4.2.2
bittorrent bittorrent 4.3.0
bittorrent bittorrent 4.3.1
bittorrent bittorrent 4.3.2
bittorrent bittorrent 4.3.3
bittorrent bittorrent 4.3.4
bittorrent bittorrent 4.3.5
bittorrent bittorrent 4.3.6
bittorrent bittorrent 4.4.0
bittorrent bittorrent 4.4.1
bittorrent bittorrent 4.9.2
bittorrent bittorrent 4.9.3
bittorrent bittorrent 4.9.4
bittorrent bittorrent 4.9.5
bittorrent bittorrent 4.9.6
bittorrent bittorrent 4.9.7
bittorrent bittorrent 4.9.8
bittorrent bittorrent 4.9.9
bittorrent bittorrent 4.20.0
bittorrent bittorrent 4.20.1
bittorrent bittorrent 4.20.2
bittorrent bittorrent 4.20.3
bittorrent bittorrent 4.20.4
bittorrent bittorrent 4.20.6
bittorrent bittorrent 4.20.7
bittorrent bittorrent 4.20.8
bittorrent bittorrent 4.20.9
bittorrent bittorrent 4.22.0
bittorrent bittorrent 4.22.1
bittorrent bittorrent 4.22.4
bittorrent bittorrent 4.24.0
bittorrent bittorrent 4.24.2
bittorrent bittorrent 4.26.0
bittorrent bittorrent 4.27.1
bittorrent bittorrent 4.27.2
bittorrent bittorrent 5.0.0
bittorrent bittorrent 5.0.1
bittorrent bittorrent 5.0.2
bittorrent bittorrent 5.0.3
bittorrent bittorrent 5.0.4
bittorrent bittorrent 5.0.5
bittorrent bittorrent 5.0.6
bittorrent bittorrent 5.0.7
bittorrent bittorrent 5.0.8
bittorrent bittorrent 5.0.9
bittorrent bittorrent 5.2.0
bittorrent bittorrent 6.0
bittorrent bittorrent 6.0.1
bittorrent bittorrent 6.0.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D5FF42-9626-44FF-862A-305F9E5F237E",
              "versionEndIncluding": "1.7.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F133D6CF-1F5C-4DA9-AD2B-A0EBD3F8783F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BE1497-6C95-41B3-861D-318B79C0BD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD2577B-7D73-414F-ABD9-99B8DB77277A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A91C32-D05F-459B-8CF1-BC965610F70F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4258E9-055A-4079-917B-B1C9680816FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64611E61-2728-437C-B35C-B104C0828A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD9058B-A162-466A-95F9-3FC1BB6838D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F63991-BFBD-4C52-B87F-DD59F4974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2148FDA-313B-4603-A89C-EDE7E41A31C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1A8AD9-50CD-4254-9A54-E439EC4B11AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "068F4B69-E6C1-4DA9-9EEB-EECB6899B3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4950A28-EB7F-4991-86E4-CDC4FA381ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "36CE40C8-0FB1-4656-9BAD-155B4409FE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "18259FA6-04B8-4C50-B74C-306F59DC090B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A643D2C-DFEC-4A98-8B56-C4B9511F65C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9D1773-3FCB-4D0C-A837-7D3B9ABA7B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B47FF8-885A-4509-B259-447EBDE79831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "01788873-AAB2-464E-B564-0E0EA62078E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E3BDC4-9B81-4D5C-897E-793173F973FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC998099-553A-4719-A903-0C67EC0D23DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81DCF33-72C0-42C2-BE0D-2B9F171E59E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EE4DA9D-FD94-4CE4-B957-3EE921AE2B87",
              "versionEndIncluding": "6.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3628182-3D58-4555-9DFF-1921CA3C54F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FDECB8-8713-4D37-A0DB-E2FB5D3A16DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF04516-5372-4D39-A58A-E0840E99C9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738167A5-9052-4ABA-843B-D5DC2DD0EAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3687F7-A1DC-4AB1-91F2-60C2639A3146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "946E1E70-E472-4C8F-BDE9-63E952F1AD41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2183E7-8338-4CE5-9D10-85E623BC50AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DE484A-930E-40CE-8FC7-25C32D94DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D7B8AC-D171-413B-B1DF-82484A4C4B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "23512725-DA47-47F9-8081-2B0A74471DBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "168AAA79-E82A-426B-ABAB-C62FA18D757E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E21B17B-EA03-4B0A-B944-E869994E596E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5D0343-9AD0-4F1D-ACDA-20BDD76F6EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43485B34-530E-4A80-8C39-3A751E8090B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "184686B8-37F7-43F7-AFAD-4B92946424C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "22BD68CE-00DD-457E-8195-96670270D543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D822D5A-F3C2-4726-9A87-B3AEC6A7D2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B5B235-6BE8-477B-B7D1-21FF14541391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34604F10-6D7A-48D3-9761-5907B1511018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6EC9CC-538E-4F44-B065-9C0B7AD9F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EABCAD8-2455-4817-8352-E1C99D6031C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BAAD599-5C89-48FA-99F3-1EFE5D491E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BB8DB0-1342-4D49-9883-3C853FBD858A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DA8E4C7-A501-4506-9D47-4CB75EE23459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73653253-EEDA-410E-B7F0-3A6997F4CCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6F507B-8AEC-488F-879C-73EDB63E72B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08D41D8-E7F7-4F78-BA39-F480C1327C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E190768-A30C-473A-ABF2-9306C2807918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C5230C8-4BCF-4366-A925-9A282DD9537F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "211C4C3B-0587-45BE-819E-51426E849A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75C68D1-F42F-4B49-9C26-767E7285001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE28509-8681-4875-B3F2-6CB89FB31B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9FCE5F-1B0F-4A33-98EB-FC3F0CDE2EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "437FACF4-0016-4E00-AFD8-0C4D32EEBF73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A196C475-C350-462F-8B20-29FA403BAC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED97A72-801C-40EB-AE70-FAC1A4593BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E091CB-F105-4032-B6CE-E2AB5098B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AF7BB-E734-45D0-A82A-A66C212296A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0E7BF1-5C10-469A-BB85-F83B0348B0DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54685CE2-734E-4DD2-92E5-D170C9AC8C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B3E9A7-759A-474B-B5A2-77336D010F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBF44AF-C4F1-4EF8-BFCD-6E43FEA76FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "826E9D27-A316-4A99-AAD0-C73A8E81513E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4E9832-90DA-4D4F-A7F5-EDC118EC85B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51155C5E-5394-4015-9ECE-CA7B63EA4C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C216CC0F-4AB7-4CAA-A44B-EE83500F0C7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCBFEB7-419A-468D-BA8C-5FBDEE7D1C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "122BCB78-104C-48B1-B0AF-BA9E1DBAC496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74325695-412A-465E-8278-AEA222354A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "112ACDDE-7742-4D7A-BA03-FE50ADF8ED02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "751E51E0-F2B9-4FB2-97C1-1D7EC3F9A6A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E6EF53-6DC8-49C5-9125-BC32CA644131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BAEFBC6-5B93-4C44-AD87-7946367AF740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F393E6B-6576-4671-8311-3B64EDAB621F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898F4B04-1329-4442-A01B-BAF47549E3E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6715F83C-7928-41CE-AB4D-7B855C3038B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865DE2B-0BDF-4120-BD0C-408518F84286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC8D79A-3A04-4E26-8EDD-7A07F3EF5D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA4DD9D-E3C9-4818-BB2C-9F4A86F65216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "153A361C-691C-4126-9FE5-EC964437F1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6395ECE-34FF-43D3-9DDA-0503B06F08E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D7B594F-AB4B-4C92-BFFD-CD55C5FB2393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "696B8F10-DCCB-41F5-B771-3B8EF8DD33B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FFA73B3-9FA6-4026-A59E-3EBBE3CDFBCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1695B6-872B-4308-A529-E18EE228886B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88598A6-F2B5-4542-9B7E-D0DF2E07325A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en (1) uTorrent v1.7.7 build 8179 y versiones anteriores y (2) BitTorrent v6.0.3 build 8642 y versiones anteriores permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un campo largo Created By en un fichero .torrent."
    }
  ],
  "id": "CVE-2008-4434",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-10-03T22:22:45.147",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/dailydave/2008/q3/0155.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31441"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31445"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30653"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020664"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2340"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2341"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/dailydave/2008/q3/0155.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0071

Vulnerability from fkie_nvd - Published: 2008-06-16 18:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
References
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28703Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30605Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2008-7/advisory/Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://securityreason.com/securityalert/3943
PSIRT-CNA@flexerasoftware.comhttp://securitytracker.com/id?1020266
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/493269/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/29661Patch
PSIRT-CNA@flexerasoftware.comhttp://www.securitytracker.com/id?1020265
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1808
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1809
PSIRT-CNA@flexerasoftware.comhttps://www.exploit-db.com/exploits/5918
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28703Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30605Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2008-7/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3943
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1020266
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493269/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29661Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020265
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1808
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1809
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5918
Impacted products
Vendor Product Version
bittorrent bittorrent *
bittorrent bittorrent 3.9.1
bittorrent bittorrent 4.0.0
bittorrent bittorrent 4.0.1
bittorrent bittorrent 4.0.2
bittorrent bittorrent 4.0.3
bittorrent bittorrent 4.0.4
bittorrent bittorrent 4.1.0
bittorrent bittorrent 4.1.1
bittorrent bittorrent 4.1.2
bittorrent bittorrent 4.1.3
bittorrent bittorrent 4.1.4
bittorrent bittorrent 4.1.5
bittorrent bittorrent 4.1.6
bittorrent bittorrent 4.1.7
bittorrent bittorrent 4.1.8
bittorrent bittorrent 4.2.0
bittorrent bittorrent 4.2.1
bittorrent bittorrent 4.2.2
bittorrent bittorrent 4.3.0
bittorrent bittorrent 4.3.1
bittorrent bittorrent 4.3.2
bittorrent bittorrent 4.3.3
bittorrent bittorrent 4.3.4
bittorrent bittorrent 4.3.5
bittorrent bittorrent 4.3.6
bittorrent bittorrent 4.4.0
bittorrent bittorrent 4.4.1
bittorrent bittorrent 4.9.2
bittorrent bittorrent 4.9.3
bittorrent bittorrent 4.9.4
bittorrent bittorrent 4.9.5
bittorrent bittorrent 4.9.6
bittorrent bittorrent 4.9.7
bittorrent bittorrent 4.9.8
bittorrent bittorrent 4.9.9
bittorrent bittorrent 4.20.0
bittorrent bittorrent 4.20.1
bittorrent bittorrent 4.20.2
bittorrent bittorrent 4.20.4
bittorrent bittorrent 4.20.6
bittorrent bittorrent 4.20.7
bittorrent bittorrent 4.20.8
bittorrent bittorrent 4.20.9
bittorrent bittorrent 4.22.0
bittorrent bittorrent 4.22.1
bittorrent bittorrent 4.22.4
bittorrent bittorrent 4.24.0
bittorrent bittorrent 4.24.2
bittorrent bittorrent 4.26.0
bittorrent bittorrent 4.27.1
bittorrent bittorrent 4.27.2
bittorrent bittorrent 5.0.0
bittorrent bittorrent 5.0.1
bittorrent bittorrent 5.0.2
bittorrent bittorrent 5.0.3
bittorrent bittorrent 5.0.4
bittorrent bittorrent 5.0.5
bittorrent bittorrent 5.0.6
bittorrent bittorrent 5.0.7
bittorrent bittorrent 5.0.8
bittorrent bittorrent 5.0.9
bittorrent bittorrent 5.2.0
bittorrent bittorrent 6.0
bittorrent bittorrent 6.0.1
utorrent utorrent *
utorrent utorrent 1.1.1
utorrent utorrent 1.1.3
utorrent utorrent 1.1.4
utorrent utorrent 1.1.5
utorrent utorrent 1.1.6
utorrent utorrent 1.1.7
utorrent utorrent 1.2
utorrent utorrent 1.2.1
utorrent utorrent 1.2.2
utorrent utorrent 1.3
utorrent utorrent 1.4
utorrent utorrent 1.4.2
utorrent utorrent 1.5
utorrent utorrent 1.6
utorrent utorrent 1.7
utorrent utorrent 1.7.1
utorrent utorrent 1.7.2
utorrent utorrent 1.7.3
utorrent utorrent 1.7.4
utorrent utorrent 1.7.5
utorrent utorrent 1.7.6

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62B0043-F276-4C97-9A30-E83A39A38477",
              "versionEndIncluding": "6.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:3.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3628182-3D58-4555-9DFF-1921CA3C54F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FDECB8-8713-4D37-A0DB-E2FB5D3A16DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF04516-5372-4D39-A58A-E0840E99C9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738167A5-9052-4ABA-843B-D5DC2DD0EAEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF3687F7-A1DC-4AB1-91F2-60C2639A3146",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "946E1E70-E472-4C8F-BDE9-63E952F1AD41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2183E7-8338-4CE5-9D10-85E623BC50AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02DE484A-930E-40CE-8FC7-25C32D94DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "79D7B8AC-D171-413B-B1DF-82484A4C4B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "23512725-DA47-47F9-8081-2B0A74471DBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "168AAA79-E82A-426B-ABAB-C62FA18D757E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E21B17B-EA03-4B0A-B944-E869994E596E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5D0343-9AD0-4F1D-ACDA-20BDD76F6EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "43485B34-530E-4A80-8C39-3A751E8090B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "184686B8-37F7-43F7-AFAD-4B92946424C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "22BD68CE-00DD-457E-8195-96670270D543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D822D5A-F3C2-4726-9A87-B3AEC6A7D2DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19B5B235-6BE8-477B-B7D1-21FF14541391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34604F10-6D7A-48D3-9761-5907B1511018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6EC9CC-538E-4F44-B065-9C0B7AD9F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EABCAD8-2455-4817-8352-E1C99D6031C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BAAD599-5C89-48FA-99F3-1EFE5D491E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BB8DB0-1342-4D49-9883-3C853FBD858A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DA8E4C7-A501-4506-9D47-4CB75EE23459",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "73653253-EEDA-410E-B7F0-3A6997F4CCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6F507B-8AEC-488F-879C-73EDB63E72B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08D41D8-E7F7-4F78-BA39-F480C1327C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E190768-A30C-473A-ABF2-9306C2807918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C5230C8-4BCF-4366-A925-9A282DD9537F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "211C4C3B-0587-45BE-819E-51426E849A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75C68D1-F42F-4B49-9C26-767E7285001E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE28509-8681-4875-B3F2-6CB89FB31B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9FCE5F-1B0F-4A33-98EB-FC3F0CDE2EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "437FACF4-0016-4E00-AFD8-0C4D32EEBF73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A196C475-C350-462F-8B20-29FA403BAC91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ED97A72-801C-40EB-AE70-FAC1A4593BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E091CB-F105-4032-B6CE-E2AB5098B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AF7BB-E734-45D0-A82A-A66C212296A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54685CE2-734E-4DD2-92E5-D170C9AC8C46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B3E9A7-759A-474B-B5A2-77336D010F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CBF44AF-C4F1-4EF8-BFCD-6E43FEA76FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "826E9D27-A316-4A99-AAD0-C73A8E81513E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.20.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4E9832-90DA-4D4F-A7F5-EDC118EC85B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51155C5E-5394-4015-9ECE-CA7B63EA4C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C216CC0F-4AB7-4CAA-A44B-EE83500F0C7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.22.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCBFEB7-419A-468D-BA8C-5FBDEE7D1C3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "122BCB78-104C-48B1-B0AF-BA9E1DBAC496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74325695-412A-465E-8278-AEA222354A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.26.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "112ACDDE-7742-4D7A-BA03-FE50ADF8ED02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "751E51E0-F2B9-4FB2-97C1-1D7EC3F9A6A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:4.27.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E6EF53-6DC8-49C5-9125-BC32CA644131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BAEFBC6-5B93-4C44-AD87-7946367AF740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F393E6B-6576-4671-8311-3B64EDAB621F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898F4B04-1329-4442-A01B-BAF47549E3E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6715F83C-7928-41CE-AB4D-7B855C3038B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9865DE2B-0BDF-4120-BD0C-408518F84286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC8D79A-3A04-4E26-8EDD-7A07F3EF5D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA4DD9D-E3C9-4818-BB2C-9F4A86F65216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "153A361C-691C-4126-9FE5-EC964437F1C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6395ECE-34FF-43D3-9DDA-0503B06F08E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D7B594F-AB4B-4C92-BFFD-CD55C5FB2393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "696B8F10-DCCB-41F5-B771-3B8EF8DD33B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FFA73B3-9FA6-4026-A59E-3EBBE3CDFBCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1695B6-872B-4308-A529-E18EE228886B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D5FF42-9626-44FF-862A-305F9E5F237E",
              "versionEndIncluding": "1.7.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F133D6CF-1F5C-4DA9-AD2B-A0EBD3F8783F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BE1497-6C95-41B3-861D-318B79C0BD56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD2577B-7D73-414F-ABD9-99B8DB77277A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6A91C32-D05F-459B-8CF1-BC965610F70F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4258E9-055A-4079-917B-B1C9680816FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64611E61-2728-437C-B35C-B104C0828A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD9058B-A162-466A-95F9-3FC1BB6838D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5F63991-BFBD-4C52-B87F-DD59F4974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2148FDA-313B-4603-A89C-EDE7E41A31C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F1A8AD9-50CD-4254-9A54-E439EC4B11AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "068F4B69-E6C1-4DA9-9EEB-EECB6899B3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4950A28-EB7F-4991-86E4-CDC4FA381ED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "36CE40C8-0FB1-4656-9BAD-155B4409FE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "18259FA6-04B8-4C50-B74C-306F59DC090B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A643D2C-DFEC-4A98-8B56-C4B9511F65C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9D1773-3FCB-4D0C-A837-7D3B9ABA7B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6B47FF8-885A-4509-B259-447EBDE79831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "01788873-AAB2-464E-B564-0E0EA62078E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "69E3BDC4-9B81-4D5C-897E-793173F973FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC998099-553A-4719-A903-0C67EC0D23DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81DCF33-72C0-42C2-BE0D-2B9F171E59E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header."
    },
    {
      "lang": "es",
      "value": "El interfaz web UI en (1)BitTorrent anterior a 6.0.3 build 8642 y (2)uTorrent anterior a 1.8beta build 10524, permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una petici\u00f3n HTTP con una cabecera \"Range\" mal formada."
    }
  ],
  "id": "CVE-2008-0071",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-16T18:41:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28703"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30605"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2008-7/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/3943"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securitytracker.com/id?1020266"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29661"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securitytracker.com/id?1020265"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1808"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1809"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.exploit-db.com/exploits/5918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28703"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2008-7/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1020266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/29661"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1808"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5918"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0364

Vulnerability from fkie_nvd - Published: 2008-01-18 23:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/ruttorrent-adv.txtExploit
cve@mitre.orghttp://aluigi.org/poc/ruttorrent.zip
cve@mitre.orghttp://download.utorrent.com/1.7.6/utorrent-1.7.6.txt
cve@mitre.orghttp://forum.utorrent.com/viewtopic.php?id=29330
cve@mitre.orghttp://secunia.com/advisories/28533
cve@mitre.orghttp://secunia.com/advisories/28537
cve@mitre.orghttp://securityreason.com/securityalert/3554
cve@mitre.orghttp://www.securityfocus.com/archive/1/486426/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/27321Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39719
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/39720
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/ruttorrent-adv.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/poc/ruttorrent.zip
af854a3a-2127-422b-91ae-364da2661108http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt
af854a3a-2127-422b-91ae-364da2661108http://forum.utorrent.com/viewtopic.php?id=29330
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28533
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28537
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3554
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/486426/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27321Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39719
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/39720
Impacted products
Vendor Product Version
bittorrent bittorrent *
utorrent utorrent *
utorrent utorrent 1.8-alpha-7834

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE95C92-4707-4417-A231-962605A5D8D7",
              "versionEndIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0153AC2A-BC5D-48E8-934E-2FD2145A1254",
              "versionEndIncluding": "1.7.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:utorrent:utorrent:1.8-alpha-7834:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D8726B-2375-4058-8098-C74DC3363AC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en (1) BitTorrent 6.0 y versiones anteriores; y (2) uTorrent 1.7.5 y versiones anteriores, y 1.8-alpha-7834 y versiones anteriores en la serie 1.8.x; en Windows permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) mediante una cadena Unicode larga representando un identificador de versi\u00f3n de cliente."
    }
  ],
  "id": "CVE-2008-0364",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-18T23:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.org/poc/ruttorrent.zip"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28533"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28537"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3554"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27321"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.org/poc/ruttorrent.zip"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2015-5474 (GCVE-0-2015-5474)

Vulnerability from cvelistv5 – Published: 2015-08-13 14:00 – Updated: 2024-08-06 06:50
VLAI?
Summary
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:02.435Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-08-13T11:57:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-5474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-5474",
    "datePublished": "2015-08-13T14:00:00",
    "dateReserved": "2015-07-10T00:00:00",
    "dateUpdated": "2024-08-06T06:50:02.435Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-8515 (GCVE-0-2014-8515)

Vulnerability from cvelistv5 – Published: 2014-12-12 15:00 – Updated: 2024-08-06 13:18
VLAI?
Summary
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:18:48.328Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-12T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-8515",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-8515",
    "datePublished": "2014-12-12T15:00:00",
    "dateReserved": "2014-10-28T00:00:00",
    "dateUpdated": "2024-08-06T13:18:48.328Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-7166 (GCVE-0-2008-7166)

Vulnerability from cvelistv5 – Published: 2009-09-04 10:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://aluigi.altervista.org/adv/ruttorrent2-adv.txt x_refsource_MISC
http://secunia.com/advisories/28695 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/42826 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2008/0327 vdb-entryx_refsource_VUPEN
http://osvdb.org/42825 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/28686 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0326 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:56:14.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
          },
          {
            "name": "28695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28695"
          },
          {
            "name": "42826",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42826"
          },
          {
            "name": "ADV-2008-0327",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0327"
          },
          {
            "name": "42825",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42825"
          },
          {
            "name": "28686",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28686"
          },
          {
            "name": "ADV-2008-0326",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0326"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header.  NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-04T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
        },
        {
          "name": "28695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28695"
        },
        {
          "name": "42826",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42826"
        },
        {
          "name": "ADV-2008-0327",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0327"
        },
        {
          "name": "42825",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42825"
        },
        {
          "name": "28686",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28686"
        },
        {
          "name": "ADV-2008-0326",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0326"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7166",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header.  NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
            },
            {
              "name": "28695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28695"
            },
            {
              "name": "42826",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42826"
            },
            {
              "name": "ADV-2008-0327",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0327"
            },
            {
              "name": "42825",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42825"
            },
            {
              "name": "28686",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28686"
            },
            {
              "name": "ADV-2008-0326",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0326"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7166",
    "datePublished": "2009-09-04T10:00:00Z",
    "dateReserved": "2009-09-03T00:00:00Z",
    "dateUpdated": "2024-09-17T02:36:31.756Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4434 (GCVE-0-2008-4434)

Vulnerability from cvelistv5 – Published: 2008-10-03 22:00 – Updated: 2024-08-07 10:17
VLAI?
Summary
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.696Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1020664",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020664"
          },
          {
            "name": "31441",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31441"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
          },
          {
            "name": "ADV-2008-2341",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2341"
          },
          {
            "name": "ADV-2008-2340",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2340"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
          },
          {
            "name": "31445",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31445"
          },
          {
            "name": "30653",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30653"
          },
          {
            "name": "bittorrent-utorrent-createdby-bo(44404)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
          },
          {
            "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/dailydave/2008/q3/0155.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1020664",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020664"
        },
        {
          "name": "31441",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31441"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
        },
        {
          "name": "ADV-2008-2341",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2341"
        },
        {
          "name": "ADV-2008-2340",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2340"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
        },
        {
          "name": "31445",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31445"
        },
        {
          "name": "30653",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30653"
        },
        {
          "name": "bittorrent-utorrent-createdby-bo(44404)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
        },
        {
          "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/dailydave/2008/q3/0155.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1020664",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020664"
            },
            {
              "name": "31441",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31441"
            },
            {
              "name": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf",
              "refsource": "MISC",
              "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
            },
            {
              "name": "ADV-2008-2341",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2341"
            },
            {
              "name": "ADV-2008-2340",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2340"
            },
            {
              "name": "http://forum.utorrent.com/viewtopic.php?id=44003",
              "refsource": "CONFIRM",
              "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
            },
            {
              "name": "31445",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31445"
            },
            {
              "name": "30653",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30653"
            },
            {
              "name": "bittorrent-utorrent-createdby-bo(44404)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
            },
            {
              "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
              "refsource": "MLIST",
              "url": "http://seclists.org/dailydave/2008/q3/0155.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4434",
    "datePublished": "2008-10-03T22:00:00",
    "dateReserved": "2008-10-03T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.696Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0071 (GCVE-0-2008-0071)

Vulnerability from cvelistv5 – Published: 2008-06-16 18:26 – Updated: 2024-08-07 07:32
VLAI?
Summary
The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3943 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/28703 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/secunia_research/2008-7/advisory/ x_refsource_MISC
http://www.securityfocus.com/bid/29661 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2008/1809 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30605 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1808 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1020266 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/archive/1/493269/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1020265 vdb-entryx_refsource_SECTRACK
https://www.exploit-db.com/exploits/5918 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:23.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3943",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3943"
          },
          {
            "name": "28703",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28703"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2008-7/advisory/"
          },
          {
            "name": "29661",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29661"
          },
          {
            "name": "ADV-2008-1809",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1809"
          },
          {
            "name": "30605",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30605"
          },
          {
            "name": "ADV-2008-1808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1808"
          },
          {
            "name": "1020266",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020266"
          },
          {
            "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
          },
          {
            "name": "1020265",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020265"
          },
          {
            "name": "5918",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5918"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "3943",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3943"
        },
        {
          "name": "28703",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28703"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2008-7/advisory/"
        },
        {
          "name": "29661",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29661"
        },
        {
          "name": "ADV-2008-1809",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1809"
        },
        {
          "name": "30605",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30605"
        },
        {
          "name": "ADV-2008-1808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1808"
        },
        {
          "name": "1020266",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020266"
        },
        {
          "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
        },
        {
          "name": "1020265",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020265"
        },
        {
          "name": "5918",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5918"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2008-0071",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3943",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3943"
            },
            {
              "name": "28703",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28703"
            },
            {
              "name": "http://secunia.com/secunia_research/2008-7/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2008-7/advisory/"
            },
            {
              "name": "29661",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29661"
            },
            {
              "name": "ADV-2008-1809",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1809"
            },
            {
              "name": "30605",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30605"
            },
            {
              "name": "ADV-2008-1808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1808"
            },
            {
              "name": "1020266",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020266"
            },
            {
              "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
            },
            {
              "name": "1020265",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020265"
            },
            {
              "name": "5918",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5918"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2008-0071",
    "datePublished": "2008-06-16T18:26:00",
    "dateReserved": "2008-01-03T00:00:00",
    "dateUpdated": "2024-08-07T07:32:23.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0364 (GCVE-0-2008-0364)

Vulnerability from cvelistv5 – Published: 2008-01-18 22:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:39:34.610Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27321",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27321"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/poc/ruttorrent.zip"
          },
          {
            "name": "28537",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28537"
          },
          {
            "name": "28533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28533"
          },
          {
            "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
          },
          {
            "name": "3554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3554"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
          },
          {
            "name": "utorrent-peers-bo(39720)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
          },
          {
            "name": "bittorrent-peers-bo(39719)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27321",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27321"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/poc/ruttorrent.zip"
        },
        {
          "name": "28537",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28537"
        },
        {
          "name": "28533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28533"
        },
        {
          "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
        },
        {
          "name": "3554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3554"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
        },
        {
          "name": "utorrent-peers-bo(39720)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
        },
        {
          "name": "bittorrent-peers-bo(39719)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27321",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27321"
            },
            {
              "name": "http://aluigi.org/poc/ruttorrent.zip",
              "refsource": "MISC",
              "url": "http://aluigi.org/poc/ruttorrent.zip"
            },
            {
              "name": "28537",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28537"
            },
            {
              "name": "28533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28533"
            },
            {
              "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
            },
            {
              "name": "http://forum.utorrent.com/viewtopic.php?id=29330",
              "refsource": "CONFIRM",
              "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
            },
            {
              "name": "3554",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3554"
            },
            {
              "name": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
            },
            {
              "name": "utorrent-peers-bo(39720)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
            },
            {
              "name": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt",
              "refsource": "CONFIRM",
              "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
            },
            {
              "name": "bittorrent-peers-bo(39719)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0364",
    "datePublished": "2008-01-18T22:00:00",
    "dateReserved": "2008-01-18T00:00:00",
    "dateUpdated": "2024-08-07T07:39:34.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-5474 (GCVE-0-2015-5474)

Vulnerability from nvd – Published: 2015-08-13 14:00 – Updated: 2024-08-06 06:50
VLAI?
Summary
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:50:02.435Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-08-13T11:57:05",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-5474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-358/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-5474",
    "datePublished": "2015-08-13T14:00:00",
    "dateReserved": "2015-07-10T00:00:00",
    "dateUpdated": "2024-08-06T06:50:02.435Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-8515 (GCVE-0-2014-8515)

Vulnerability from nvd – Published: 2014-12-12 15:00 – Updated: 2024-08-06 13:18
VLAI?
Summary
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:18:48.328Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-12T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-8515",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-418/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-8515",
    "datePublished": "2014-12-12T15:00:00",
    "dateReserved": "2014-10-28T00:00:00",
    "dateUpdated": "2024-08-06T13:18:48.328Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-7166 (GCVE-0-2008-7166)

Vulnerability from nvd – Published: 2009-09-04 10:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://aluigi.altervista.org/adv/ruttorrent2-adv.txt x_refsource_MISC
http://secunia.com/advisories/28695 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/42826 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2008/0327 vdb-entryx_refsource_VUPEN
http://osvdb.org/42825 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/28686 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0326 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:56:14.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
          },
          {
            "name": "28695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28695"
          },
          {
            "name": "42826",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42826"
          },
          {
            "name": "ADV-2008-0327",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0327"
          },
          {
            "name": "42825",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42825"
          },
          {
            "name": "28686",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28686"
          },
          {
            "name": "ADV-2008-0326",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0326"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header.  NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-09-04T10:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
        },
        {
          "name": "28695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28695"
        },
        {
          "name": "42826",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42826"
        },
        {
          "name": "ADV-2008-0327",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0327"
        },
        {
          "name": "42825",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42825"
        },
        {
          "name": "28686",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28686"
        },
        {
          "name": "ADV-2008-0326",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0326"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7166",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header.  NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/ruttorrent2-adv.txt"
            },
            {
              "name": "28695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28695"
            },
            {
              "name": "42826",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42826"
            },
            {
              "name": "ADV-2008-0327",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0327"
            },
            {
              "name": "42825",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42825"
            },
            {
              "name": "28686",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28686"
            },
            {
              "name": "ADV-2008-0326",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0326"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7166",
    "datePublished": "2009-09-04T10:00:00Z",
    "dateReserved": "2009-09-03T00:00:00Z",
    "dateUpdated": "2024-09-17T02:36:31.756Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4434 (GCVE-0-2008-4434)

Vulnerability from nvd – Published: 2008-10-03 22:00 – Updated: 2024-08-07 10:17
VLAI?
Summary
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.696Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1020664",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020664"
          },
          {
            "name": "31441",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31441"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
          },
          {
            "name": "ADV-2008-2341",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2341"
          },
          {
            "name": "ADV-2008-2340",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2340"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
          },
          {
            "name": "31445",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31445"
          },
          {
            "name": "30653",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30653"
          },
          {
            "name": "bittorrent-utorrent-createdby-bo(44404)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
          },
          {
            "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/dailydave/2008/q3/0155.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1020664",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020664"
        },
        {
          "name": "31441",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31441"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
        },
        {
          "name": "ADV-2008-2341",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2341"
        },
        {
          "name": "ADV-2008-2340",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2340"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
        },
        {
          "name": "31445",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31445"
        },
        {
          "name": "30653",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30653"
        },
        {
          "name": "bittorrent-utorrent-createdby-bo(44404)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
        },
        {
          "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/dailydave/2008/q3/0155.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1020664",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020664"
            },
            {
              "name": "31441",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31441"
            },
            {
              "name": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf",
              "refsource": "MISC",
              "url": "http://lists.immunitysec.com/pipermail/dailydave/attachments/20080811/35d6194b/attachment-0001.pdf"
            },
            {
              "name": "ADV-2008-2341",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2341"
            },
            {
              "name": "ADV-2008-2340",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2340"
            },
            {
              "name": "http://forum.utorrent.com/viewtopic.php?id=44003",
              "refsource": "CONFIRM",
              "url": "http://forum.utorrent.com/viewtopic.php?id=44003"
            },
            {
              "name": "31445",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31445"
            },
            {
              "name": "30653",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30653"
            },
            {
              "name": "bittorrent-utorrent-createdby-bo(44404)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44404"
            },
            {
              "name": "[dailydave] 20080811 A new datapoint for 0day lifetime",
              "refsource": "MLIST",
              "url": "http://seclists.org/dailydave/2008/q3/0155.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4434",
    "datePublished": "2008-10-03T22:00:00",
    "dateReserved": "2008-10-03T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.696Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0071 (GCVE-0-2008-0071)

Vulnerability from nvd – Published: 2008-06-16 18:26 – Updated: 2024-08-07 07:32
VLAI?
Summary
The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3943 third-party-advisoryx_refsource_SREASON
http://secunia.com/advisories/28703 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/secunia_research/2008-7/advisory/ x_refsource_MISC
http://www.securityfocus.com/bid/29661 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2008/1809 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/30605 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1808 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1020266 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/archive/1/493269/100… mailing-listx_refsource_BUGTRAQ
http://www.securitytracker.com/id?1020265 vdb-entryx_refsource_SECTRACK
https://www.exploit-db.com/exploits/5918 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:23.931Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3943",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3943"
          },
          {
            "name": "28703",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28703"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2008-7/advisory/"
          },
          {
            "name": "29661",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29661"
          },
          {
            "name": "ADV-2008-1809",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1809"
          },
          {
            "name": "30605",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30605"
          },
          {
            "name": "ADV-2008-1808",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1808"
          },
          {
            "name": "1020266",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1020266"
          },
          {
            "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
          },
          {
            "name": "1020265",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020265"
          },
          {
            "name": "5918",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5918"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "3943",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3943"
        },
        {
          "name": "28703",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28703"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2008-7/advisory/"
        },
        {
          "name": "29661",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29661"
        },
        {
          "name": "ADV-2008-1809",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1809"
        },
        {
          "name": "30605",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30605"
        },
        {
          "name": "ADV-2008-1808",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1808"
        },
        {
          "name": "1020266",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1020266"
        },
        {
          "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
        },
        {
          "name": "1020265",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020265"
        },
        {
          "name": "5918",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5918"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2008-0071",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3943",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3943"
            },
            {
              "name": "28703",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28703"
            },
            {
              "name": "http://secunia.com/secunia_research/2008-7/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2008-7/advisory/"
            },
            {
              "name": "29661",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29661"
            },
            {
              "name": "ADV-2008-1809",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1809"
            },
            {
              "name": "30605",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30605"
            },
            {
              "name": "ADV-2008-1808",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1808"
            },
            {
              "name": "1020266",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1020266"
            },
            {
              "name": "20080611 Secunia Research: uTorrent / BitTorrent Web UI HTTP \"Range\" Header DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/493269/100/0/threaded"
            },
            {
              "name": "1020265",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020265"
            },
            {
              "name": "5918",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5918"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2008-0071",
    "datePublished": "2008-06-16T18:26:00",
    "dateReserved": "2008-01-03T00:00:00",
    "dateUpdated": "2024-08-07T07:32:23.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0364 (GCVE-0-2008-0364)

Vulnerability from nvd – Published: 2008-01-18 22:00 – Updated: 2024-08-07 07:39
VLAI?
Summary
Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:39:34.610Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "27321",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27321"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/poc/ruttorrent.zip"
          },
          {
            "name": "28537",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28537"
          },
          {
            "name": "28533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28533"
          },
          {
            "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
          },
          {
            "name": "3554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3554"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
          },
          {
            "name": "utorrent-peers-bo(39720)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
          },
          {
            "name": "bittorrent-peers-bo(39719)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "27321",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27321"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/poc/ruttorrent.zip"
        },
        {
          "name": "28537",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28537"
        },
        {
          "name": "28533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28533"
        },
        {
          "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
        },
        {
          "name": "3554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3554"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
        },
        {
          "name": "utorrent-peers-bo(39720)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
        },
        {
          "name": "bittorrent-peers-bo(39719)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "27321",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27321"
            },
            {
              "name": "http://aluigi.org/poc/ruttorrent.zip",
              "refsource": "MISC",
              "url": "http://aluigi.org/poc/ruttorrent.zip"
            },
            {
              "name": "28537",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28537"
            },
            {
              "name": "28533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28533"
            },
            {
              "name": "20080116 Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486426/100/0/threaded"
            },
            {
              "name": "http://forum.utorrent.com/viewtopic.php?id=29330",
              "refsource": "CONFIRM",
              "url": "http://forum.utorrent.com/viewtopic.php?id=29330"
            },
            {
              "name": "3554",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3554"
            },
            {
              "name": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/ruttorrent-adv.txt"
            },
            {
              "name": "utorrent-peers-bo(39720)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39720"
            },
            {
              "name": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt",
              "refsource": "CONFIRM",
              "url": "http://download.utorrent.com/1.7.6/utorrent-1.7.6.txt"
            },
            {
              "name": "bittorrent-peers-bo(39719)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39719"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0364",
    "datePublished": "2008-01-18T22:00:00",
    "dateReserved": "2008-01-18T00:00:00",
    "dateUpdated": "2024-08-07T07:39:34.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}