9 results (0.018 seconds)

CVSS: 7.8EPSS: 1%CPEs: 5EXPL: 1

Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file. Un uso de la memoria previamente liberada en el archivo libtransmission/variant.c en Transmission versiones anteriores a 3.00, permite a atacantes remotos causar una denegación de servicio (bloqueo) o posiblemente ejecutar código arbitrario por medio de un archivo torrent diseñado. • https://github.com/transmission/transmission/commit/2123adf8e5e1c2b48791f9d22fc8c747e974180e https://lists.debian.org/debian-lts-announce/2020/05/msg00022.html https://lists.debian.org/debian-lts-announce/2020/08/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CD3GLZ5URIK74RCGLSH72IVLDIJJMLQC https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVAG2HNKNRLWOACFN5F2ANJD2SQ53WI7 https://security.gentoo.org/glsa/202007-07 https://tomrichards. • CWE-416: Use After Free •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame. Transmission versiones anteriores a 1.92, permite a atacantes impedir la descarga de un archivo mediante datos corruptos durante el final del juego. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0749 https://github.com/transmission/transmission/wiki/Release-Notes#transmission-192-20100314 https://security-tracker.debian.org/tracker/CVE-2010-0749 https://trac.transmissionbt.com/ticket/1242 https://www.openwall.com/lists/oss-security/2010/04/01/9 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 5EXPL: 1

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link. Transmission versiones anteriores a 1.92, permite a un atacante causar una denegación de servicio (bloqueo) o posiblemente tener otro impacto no especificado por medio de una gran cantidad de argumentos tr en un enlace magnético. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0748 https://github.com/transmission/transmission/wiki/Release-Notes#transmission-192-20100314 https://security-tracker.debian.org/tracker/CVE-2010-0748 https://trac.transmissionbt.com/ticket/2965 https://www.openwall.com/lists/oss-security/2010/04/01/9 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 3

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. Transmission, hasta la versión 2.92, confía en X-Transmission-Session-Id (que no es una cabecera prohibida para Fetch) para el control de acceso, lo que permite que atacantes remotos ejecuten comandos RPC arbitrarios y escriban en archivos arbitrarios mediante peticiones POST en /transmission/rpc, en combinación con un ataque de DNS rebinding. • https://www.exploit-db.com/exploits/43665 https://bugs.chromium.org/p/project-zero/issues/detail?id=1447 https://github.com/transmission/transmission/pull/468 https://lists.debian.org/debian-lts-announce/2018/01/msg00020.html https://security.gentoo.org/glsa/201806-07 https://twitter.com/taviso/status/951526615145566208 https://www.debian.org/security/2018/dsa-4087 •

CVSS: 6.8EPSS: 3%CPEs: 105EXPL: 1

Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write. Desbordamiento de enteros en la función tr_bitfieldEnsureNthBitAlloced en bitfield.c en Transmission anterior a 2.84 permite a atacantes remotos causar una denegación de servicios y posiblemente ejecutar código arbitrario a través de un mensaje de par manipulado, lo que provoca una escritura fuera de rango. • http://inertiawar.com/submission.go http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html http://secunia.com/advisories/59897 http://secunia.com/advisories/60108 http://secunia.com/advisories/60527 http://www.debian.org/security/2014/dsa-2988 http://www.openwall.com/lists/oss-security/2014/07/10/4 http://www.openwall.com/lists/oss-security/2014/07/11/5 http://www.osvdb.org/108 • CWE-189: Numeric Errors •