Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=476241
secunia.com/advisories/29917
secunia.com/advisories/29919
secunia.com/advisories/30661
sourceforge.net/project/shownotes.php?release_id=593465&group_id=98211
www.debian.org/security/2008/dsa-1597
www.securityfocus.com/bid/28860
www.securitytracker.com/id?1019908
www.vupen.com/english/advisories/2008/1303/references
exchange.xforce.ibmcloud.com/vulnerabilities/41850
www.redhat.com/archives/fedora-package-announce/2008-April/msg00446.html