vendor:
rtorrent
by:
ecx86
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: rtorrent
Affected Version From: <= 0.9.6
Affected Version To: <= 0.9.6
Patch Exists: YES
Related CWE: N/A
CPE: rtorrent
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian GNU/Linux 9.4 (stretch)
2018
rtorrent 0.9.6 – Denial of Service
This crash is due to a bad bencode parse of the handshake data map. Specifically, by providing a massive length for a string, namely the key of a map entry, malloc fails, returning 0, which is passed to a memcpy call that causes the segfault. This can be triggered actively by sending the crash-triggering data to a seeding rtorrent client, or when a downloading rtorrent client connects to a malicious peer.
Mitigation:
Ensure that the rtorrent version is updated to the latest version.