Vulnerability Details : CVE-2009-0184
Public exploit exists!
Multiple buffer overflows in the torrent parsing implementation in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allow remote attackers to execute arbitrary code via (1) a long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file.
Vulnerability category: Execute code
Products affected by CVE-2009-0184
- cpe:2.3:a:free_download_manager:free_download_manager:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:free_download_manager:free_download_manager:3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0184
59.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2009-0184
-
Free Download Manager Torrent Parsing Buffer Overflow
Disclosure Date: 2009-02-02First seen: 2020-04-26exploit/windows/fileformat/fdm_torrentThis module exploits a stack buffer overflow in Free Download Manager 3.0 Build 844. Arbitrary code execution could occur when parsing a specially crafted torrent file. Authors: - SkD <skdrat@hotmail.com> - jduck <jduck@metasploit.com>
CVSS scores for CVE-2009-0184
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-0184
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0184
-
http://www.securityfocus.com/bid/33555
Free Download Manager Torrent File Parsing Multiple Remote Buffer Overflow Vulnerabilities
-
http://secunia.com/advisories/33524
Vendor Advisory
-
http://www.securityfocus.com/archive/1/500605/100/0/threaded
-
http://www.vupen.com/english/advisories/2009/0302
-
http://secunia.com/secunia_research/2009-5/
About Secunia Research | FlexeraVendor Advisory
Jump to