The vulnerability is caused due to a boundary error in the processing of .TORRENT files. This can be exploited to cause a stack-based buffer overflow by tricking the user into opening a .TORRENT file containing an overly long Created By field.
CVE Link
Exploit Type - Old
Exploits/Client Side
Exploit Type
Product Name