Gentoo Linux Security Advisory 201311-11 - A stack-based buffer overflow in CTorrent might allow a remote attacker to execute arbitrary code or cause a Denial of Service condition. Versions less than 3.3.2-r1 are affected.
737368af1259f8ff95a25fe794f06dd4030a9bc406f8acbd7d38c92617b20d93
Debian Security Advisory 1817-1 - Michael Brooks discovered that ctorrent, a text-mode bittorrent client, does not verify the length of file paths in torrent files. An attacker can exploit this via a crafted torrent that contains a long file path to execute arbitrary code with the rights of the user opening the file.
04a3025ed0f99514632bf98b2b6b03c9b67be83812ffe576041b45ae447a9ea3