Jump to content

uTorrent overflow (buffer overflow?) in Securityfocus - true or not?


jansma

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

hello

noting ganna happen in uTorrent

that not exploit that only bug

and i write this script to accept it in Securityfocus loool

sorry for that

Dj.r4iDeN

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.7 (MingW32)

iD8DBQFGZzbwwTc7sebm4msRAkNWAKCL4Kpe5QGv7juPwc4NCd6sNGCbTACeILIX

nvApX6Ca7LLIu7XQlAJ7bMs=

=X8hn

-----END PGP SIGNATURE-----

Link to comment
Share on other sites

  • 1 month later...

It's normal to be able to telnet to an open port, what's unexpected is the gibberish that uT dumps out.

It's not bencoded data, nor the normal handhsake, and it changes every time.

Azureus closes the connection silently (as expected), bitcomet does something similar to uT.

Anyone know what this data is?

BTW, it does seem to work as an exploit on bitcomet. All options became unavailable while testing, including the close button :P

Edit: second testing doesn't crash BC

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...