cve-2012-6129
Vulnerability from cvelistv5
Published
2013-04-03 00:00
Modified
2024-09-16 22:50
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets."
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T21:28:38.970Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2013:0485", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://trac.transmissionbt.com/ticket/5002", }, { name: "USN-1747-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1747-1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=909934", }, { name: "[oss-security] 20130212 Re: CVE request: Transmission can be made to crash remotely", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2013/02/13/1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://trac.transmissionbt.com/changeset/13646", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted \"micro transport protocol packets.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2013-04-03T00:00:00Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "openSUSE-SU-2013:0485", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html", }, { tags: [ "x_refsource_MISC", ], url: "https://trac.transmissionbt.com/ticket/5002", }, { name: "USN-1747-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1747-1", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=909934", }, { name: "[oss-security] 20130212 Re: CVE request: Transmission can be made to crash remotely", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2013/02/13/1", }, { tags: [ "x_refsource_MISC", ], url: "https://trac.transmissionbt.com/changeset/13646", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2012-6129", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted \"micro transport protocol packets.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2013:0485", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html", }, { name: "https://trac.transmissionbt.com/ticket/5002", refsource: "MISC", url: "https://trac.transmissionbt.com/ticket/5002", }, { name: "USN-1747-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-1747-1", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=909934", refsource: "MISC", url: "https://bugzilla.redhat.com/show_bug.cgi?id=909934", }, { name: "[oss-security] 20130212 Re: CVE request: Transmission can be made to crash remotely", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2013/02/13/1", }, { name: "https://trac.transmissionbt.com/changeset/13646", refsource: "MISC", url: "https://trac.transmissionbt.com/changeset/13646", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2012-6129", datePublished: "2013-04-03T00:00:00Z", dateReserved: "2012-12-06T00:00:00Z", dateUpdated: "2024-09-16T22:50:21.566Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2012-6129\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-04-03T00:55:01.283\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted \\\"micro transport protocol packets.\\\"\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de búfer basado en pila en utp.cpp en libutp, tal como se utiliza en la transmisión antes de v2.74 y posiblemente otros productos, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de \\\"paquetes de protocolo micro de transporte\\\" elaborados para este proposito.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.73\",\"matchCriteriaId\":\"6C1245F6-DFD1-44D3-93D5-DA77AB818244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF93408-3A3D-4FD8-A857-C7A872964D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE58C6BE-513E-458F-9A74-F037F287D415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B877F9A-C73B-4B81-9E5C-B92E7C080E7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9AE0C3-5609-42C5-A08E-C299ECEE82E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"135D1D2D-4A9F-4EBB-9D50-92B25DC60879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040D1568-6213-4A5C-99D5-AB4ECAF345A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8240A86D-3B9A-4128-9645-331A18C16C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B583C2-48AD-4EC9-AA64-9FCBF7840AE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01489B59-895D-45AA-846E-521961E7C0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C8E851-6FE0-469B-BA93-B5E46CEA9DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7165AE-5A4D-4FDD-95BF-5D2754778FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE9CFEEC-E2F4-456E-A7AE-94F822A0F333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE49E40-8F91-4885-8F46-9E038E978563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A43CB7E-0126-46EA-BEB6-8C1AB1E5AC1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E04D86-17AA-4777-AD8C-FF62477767EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9587577D-CEFD-4E92-A667-B40357FBFF04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDD24F7-412D-4922-B803-23D53F95FBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E89FF5-FC50-4F90-8419-8D2F941FA42E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3795D4-AC23-4F9F-B6B4-5BD429BCAE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:0.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06444C9C-252E-4303-9BCA-B2C0332B04A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB85CAB-5987-4066-BB78-8B71A7E3510F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630B75D1-9E59-4EBE-8D53-BE4893F62774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72BD649-9E99-425D-BC95-C54FB15AEFF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"105E1FA8-08AE-477E-B7F2-68BCDE6EEA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F076D056-0292-40F7-A50C-8B13922A3C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6F3AEA3-C68A-4A76-8BFC-52CAF4C91106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2928593-E0E1-429E-A67F-B5A61E8E5199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D2CFA06-5B3B-40BC-8D2F-450408A0E616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C46E575-274E-43F9-B815-BC1F3C29552A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62611674-01EB-4AB3-90E5-CF22935E3DF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E151076-5286-4FBF-B53C-28F5D9D41566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A583FF8-E8A5-48AB-AE2F-D7F64BE9F9A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B90969C1-C1A4-4C3B-9313-56E1985DCD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BC6E21-3766-4D78-9F44-5EFDCD5F38D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E61E47-D922-4219-A220-153EA38E7A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13E7B38-B905-4048-A75B-1AA3A28A49F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421BD25F-E03F-41DA-8E81-444DE5C5622A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6A7241-50D3-4E5E-8FEA-6BF600E5E4B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DC0548-67E2-474C-AF06-9101DF378484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4B2A9F0-BE57-4846-BD7C-C2A39FF7E5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD404C1-CDD6-4118-8FCE-905C401FD3F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C570DD0B-CB0D-4451-AC24-47853DCE4E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8976E88E-6F6C-4E77-87A4-8F1AAA854C7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53FAA2E-0DA8-4E61-A27F-B3A163664848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07949FB-2E87-4B8A-B7E2-60444ED696B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE2FA6F-B00F-487E-ADAA-B1D143EC0E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91A94B6D-5A85-413D-AE62-BF3AA92DF907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CCE11DA-4DA7-4514-B36B-31CA63152C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E760518-A52C-4A3F-83FB-ACCA48B7923F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A781F17-EF6E-45F5-9839-36C026CF9CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A55EC6-EECB-4804-9F67-02F21A7BFB51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F55CA862-6178-4FEC-A122-6A62885D29EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44F8B086-2248-415B-8021-C9C94A4E2FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D9C12FB-48A9-441A-9FA1-CBAB73F2F58D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B75889-EBAC-445A-A533-BA3C1364221E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D208640B-D2E6-46A3-BBC7-9C0762936539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216E8246-8E7B-4EAB-9452-E56AAE16765A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4F3F54-2AE0-46B3-97E4-39696C1AE6C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA16CCA-ABED-402E-9EE1-454B8E120892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA75982-D35A-42FA-A2E9-928AD9FE9CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EFB745A-88F7-4A47-9A44-8711E3606E08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAC0FAB-F158-4E2F-B7AC-FFE63BA565D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF4D6A2-DBC1-49EE-9638-A3A22511CB5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DB6C12-279A-4B0A-BE64-144AD038524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDDD4AD-C0C8-4FDA-97E7-F1395340AFBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22C27354-98E7-47D2-95CB-FF59963F24EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E94CFB0-5945-4A0A-A40B-BB8ABDC6911A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F21460D-70BE-4F66-BEA7-C6700310F8A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C44CFB78-950B-4354-BF51-B4DE70723F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"812C82F6-EB76-43D0-8EA6-E917FE544139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"943A3E15-3069-4B55-90F9-A36EB82E1FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090E313A-9FD2-4D07-9D41-FE9450E12110\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E3FEC6-9C1D-4975-9B29-1510587416D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952EBA2A-DCEC-41F0-A5D6-4EDC18DCBFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A6D8E86-B710-4C18-BCAD-81A6CAEC5DBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52C0634-FBC2-47CF-B1FA-E3E873D8AB84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B4DB35-A633-4D6C-928A-FB016CF87A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA5759E-A7DC-48B0-8BEA-616D5615FE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8420D18C-D4D5-4FB6-A5B2-F4DD3286C99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160BE257-6A76-411E-8E5D-E5CA65C2B891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE182574-8650-4A4A-91F0-5D1497D1ADA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8465A93C-2761-4DE8-A0B8-BF54912EC132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5487F402-49C4-4DB3-92CA-5B40E760AE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98ABCA8A-AFE4-48F0-842C-27C4D45EDAB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DD4B602-A244-4410-BD90-57B4F7FE4668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"801EE163-E97C-4D5D-A4AB-F62DDFE2A593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C4E83F-83C6-4A48-BEAD-0F9EB737F94C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C261E066-B709-42AA-93C1-47044B499AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C45D85-7F72-4D5B-8581-3E038864822E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831C74DF-AEDE-4EFD-95F8-9141E57614C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:transmissionbt:transmission:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB76BC4-93D9-4581-B8D3-219C9EB4F942\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4174F4F-149E-41A6-BBCC-D01114C05F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"706C6399-CAD1-46E3-87A2-8DFE2CF497ED\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/02/13/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1747-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=909934\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://trac.transmissionbt.com/changeset/13646\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://trac.transmissionbt.com/ticket/5002\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/02/13/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1747-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=909934\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://trac.transmissionbt.com/changeset/13646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://trac.transmissionbt.com/ticket/5002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Per http://www.ubuntu.com/usn/USN-1747-1/ \\\"A security issue affects these releases of Ubuntu and its derivatives:\\r\\n Ubuntu 12.10\\r\\n Ubuntu 12.04 LTS\\r\\n Ubuntu 11.10\\\"\\r\\n\\r\\nPer https://bugzilla.redhat.com/show_bug.cgi?id=909934 \\\"\\r\\nThis issue affects the version of the transmission package, as shipped with Fedora release of 16. Please schedule an update.\\\"\"}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.