fkie_cve-2012-6129
Vulnerability from fkie_nvd
Published
2013-04-03 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets."
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1245F6-DFD1-44D3-93D5-DA77AB818244",
"versionEndIncluding": "2.73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAF93408-3A3D-4FD8-A857-C7A872964D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE58C6BE-513E-458F-9A74-F037F287D415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B877F9A-C73B-4B81-9E5C-B92E7C080E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9AE0C3-5609-42C5-A08E-C299ECEE82E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "135D1D2D-4A9F-4EBB-9D50-92B25DC60879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "040D1568-6213-4A5C-99D5-AB4ECAF345A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8240A86D-3B9A-4128-9645-331A18C16C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "48B583C2-48AD-4EC9-AA64-9FCBF7840AE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "01489B59-895D-45AA-846E-521961E7C0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C8E851-6FE0-469B-BA93-B5E46CEA9DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7165AE-5A4D-4FDD-95BF-5D2754778FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.81:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9CFEEC-E2F4-456E-A7AE-94F822A0F333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE49E40-8F91-4885-8F46-9E038E978563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "4A43CB7E-0126-46EA-BEB6-8C1AB1E5AC1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "03E04D86-17AA-4777-AD8C-FF62477767EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.92:*:*:*:*:*:*:*",
"matchCriteriaId": "9587577D-CEFD-4E92-A667-B40357FBFF04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.93:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDD24F7-412D-4922-B803-23D53F95FBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.94:*:*:*:*:*:*:*",
"matchCriteriaId": "73E89FF5-FC50-4F90-8419-8D2F941FA42E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3795D4-AC23-4F9F-B6B4-5BD429BCAE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:0.96:*:*:*:*:*:*:*",
"matchCriteriaId": "06444C9C-252E-4303-9BCA-B2C0332B04A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB85CAB-5987-4066-BB78-8B71A7E3510F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "630B75D1-9E59-4EBE-8D53-BE4893F62774",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D72BD649-9E99-425D-BC95-C54FB15AEFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "105E1FA8-08AE-477E-B7F2-68BCDE6EEA42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "F076D056-0292-40F7-A50C-8B13922A3C47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.04:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F3AEA3-C68A-4A76-8BFC-52CAF4C91106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "A2928593-E0E1-429E-A67F-B5A61E8E5199",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.06:*:*:*:*:*:*:*",
"matchCriteriaId": "8D2CFA06-5B3B-40BC-8D2F-450408A0E616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C46E575-274E-43F9-B815-BC1F3C29552A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "62611674-01EB-4AB3-90E5-CF22935E3DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "2E151076-5286-4FBF-B53C-28F5D9D41566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "8A583FF8-E8A5-48AB-AE2F-D7F64BE9F9A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B90969C1-C1A4-4C3B-9313-56E1985DCD2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BC6E21-3766-4D78-9F44-5EFDCD5F38D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "70E61E47-D922-4219-A220-153EA38E7A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "D13E7B38-B905-4048-A75B-1AA3A28A49F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "421BD25F-E03F-41DA-8E81-444DE5C5622A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "7E6A7241-50D3-4E5E-8FEA-6BF600E5E4B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "98DC0548-67E2-474C-AF06-9101DF378484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B2A9F0-BE57-4846-BD7C-C2A39FF7E5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD404C1-CDD6-4118-8FCE-905C401FD3F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.50:*:*:*:*:*:*:*",
"matchCriteriaId": "C570DD0B-CB0D-4451-AC24-47853DCE4E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.51:*:*:*:*:*:*:*",
"matchCriteriaId": "8976E88E-6F6C-4E77-87A4-8F1AAA854C7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C53FAA2E-0DA8-4E61-A27F-B3A163664848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "D07949FB-2E87-4B8A-B7E2-60444ED696B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "0EE2FA6F-B00F-487E-ADAA-B1D143EC0E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.60:*:*:*:*:*:*:*",
"matchCriteriaId": "91A94B6D-5A85-413D-AE62-BF3AA92DF907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCE11DA-4DA7-4514-B36B-31CA63152C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.70:*:*:*:*:*:*:*",
"matchCriteriaId": "7E760518-A52C-4A3F-83FB-ACCA48B7923F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "1A781F17-EF6E-45F5-9839-36C026CF9CD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "02A55EC6-EECB-4804-9F67-02F21A7BFB51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "F55CA862-6178-4FEC-A122-6A62885D29EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.74:*:*:*:*:*:*:*",
"matchCriteriaId": "44F8B086-2248-415B-8021-C9C94A4E2FBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.75:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9C12FB-48A9-441A-9FA1-CBAB73F2F58D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B75889-EBAC-445A-A533-BA3C1364221E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.77:*:*:*:*:*:*:*",
"matchCriteriaId": "D208640B-D2E6-46A3-BBC7-9C0762936539",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "216E8246-8E7B-4EAB-9452-E56AAE16765A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4F3F54-2AE0-46B3-97E4-39696C1AE6C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA16CCA-ABED-402E-9EE1-454B8E120892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA75982-D35A-42FA-A2E9-928AD9FE9CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFB745A-88F7-4A47-9A44-8711E3606E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "AFAC0FAB-F158-4E2F-B7AC-FFE63BA565D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF4D6A2-DBC1-49EE-9638-A3A22511CB5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "41DB6C12-279A-4B0A-BE64-144AD038524A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDDD4AD-C0C8-4FDA-97E7-F1395340AFBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "22C27354-98E7-47D2-95CB-FF59963F24EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "8E94CFB0-5945-4A0A-A40B-BB8ABDC6911A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "5F21460D-70BE-4F66-BEA7-C6700310F8A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "C44CFB78-950B-4354-BF51-B4DE70723F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "812C82F6-EB76-43D0-8EA6-E917FE544139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "943A3E15-3069-4B55-90F9-A36EB82E1FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "090E313A-9FD2-4D07-9D41-FE9450E12110",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "71E3FEC6-9C1D-4975-9B29-1510587416D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "952EBA2A-DCEC-41F0-A5D6-4EDC18DCBFDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6D8E86-B710-4C18-BCAD-81A6CAEC5DBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "C52C0634-FBC2-47CF-B1FA-E3E873D8AB84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "86B4DB35-A633-4D6C-928A-FB016CF87A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA5759E-A7DC-48B0-8BEA-616D5615FE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "8420D18C-D4D5-4FB6-A5B2-F4DD3286C99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "160BE257-6A76-411E-8E5D-E5CA65C2B891",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "AE182574-8650-4A4A-91F0-5D1497D1ADA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "8465A93C-2761-4DE8-A0B8-BF54912EC132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "5487F402-49C4-4DB3-92CA-5B40E760AE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "98ABCA8A-AFE4-48F0-842C-27C4D45EDAB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD4B602-A244-4410-BD90-57B4F7FE4668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "801EE163-E97C-4D5D-A4AB-F62DDFE2A593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C4E83F-83C6-4A48-BEAD-0F9EB737F94C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "C261E066-B709-42AA-93C1-47044B499AA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C45D85-7F72-4D5B-8581-3E038864822E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.71:*:*:*:*:*:*:*",
"matchCriteriaId": "831C74DF-AEDE-4EFD-95F8-9141E57614C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:transmissionbt:transmission:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB76BC4-93D9-4581-B8D3-219C9EB4F942",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
"matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted \"micro transport protocol packets.\""
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en utp.cpp en libutp, tal como se utiliza en la transmisi\u00f3n antes de v2.74 y posiblemente otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de \"paquetes de protocolo micro de transporte\" elaborados para este proposito."
}
],
"evaluatorImpact": "Per http://www.ubuntu.com/usn/USN-1747-1/ \"A security issue affects these releases of Ubuntu and its derivatives:\r\n Ubuntu 12.10\r\n Ubuntu 12.04 LTS\r\n Ubuntu 11.10\"\r\n\r\nPer https://bugzilla.redhat.com/show_bug.cgi?id=909934 \"\r\nThis issue affects the version of the transmission package, as shipped with Fedora release of 16. Please schedule an update.\"",
"id": "CVE-2012-6129",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-03T00:55:01.283",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/02/13/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1747-1"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909934"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch"
],
"url": "https://trac.transmissionbt.com/changeset/13646"
},
{
"source": "secalert@redhat.com",
"url": "https://trac.transmissionbt.com/ticket/5002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/02/13/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1747-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909934"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://trac.transmissionbt.com/changeset/13646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://trac.transmissionbt.com/ticket/5002"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…