Integer overflow in the ws_getpostvars function in Firefly Media Server (formerly mt-daapd) 0.2.4.1 (0.9~r1696-1.2 on Debian) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a large Content-Length.
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00446.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/41850
http://www.vupen.com/english/advisories/2008/1303/references
http://www.securitytracker.com/id?1019908
http://www.securityfocus.com/bid/28860
http://www.debian.org/security/2008/dsa-1597
http://sourceforge.net/project/shownotes.php?release_id=593465&group_id=98211
http://secunia.com/advisories/30661
http://secunia.com/advisories/29919