Stack-based buffer overflow in lib/Libdis/disrsi_.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 2.5.x through 2.5.13 allows remote attackers to execute arbitrary code via a large count value.Referenceshttps://github.com/adaptivecomputing/torque/commit/3ed749263abe3d69fa3626d142a5789dcb5a5684https://labs.mwrinfosecurity.com/advisories/2014/05/14/torque-buffer-overflowhttps://github.com/adaptivecomputing/torque/pull/171http://packetstormsecurity.com/files/126651/Torque-2.5.13-Buffer-Overflow.htmlhttp://www.exploit-db.com/exploits/33554http://www.securityfocus.com/archive/1/532110/100/0/threadedhttp://packetstormsecurity.com/files/126855/TORQUE-Resource-Manager-2.5.13-Buffer-Overflow.htmlhttp://www.securityfocus.com/bid/67420http://osvdb.org/show/osvdb/107024https://labs.mwrinfosecurity.com/system/assets/662/original/torque-buffer-overflow_2014-05-14.pdfhttp://www.debian.org/security/2014/dsa-2936