Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2010-0749 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0749 | Issue Tracking Patch Third Party Advisory |
https://github.com/transmission/transmission/wiki/Release-Notes#transmission-192-20100314 | Release Notes Third Party Advisory |
https://trac.transmissionbt.com/ticket/1242 | Issue Tracking Vendor Advisory |
https://www.openwall.com/lists/oss-security/2010/04/01/9 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2019-10-30 16:15
Updated : 2020-08-18 08:05
NVD link : CVE-2010-0749
Mitre link : CVE-2010-0749
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
transmissionbt
- transmission
debian
- debian_linux
linux
- linux_kernel