Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.
                
            References
                    | Link | Resource | 
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2010-0749 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0749 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/transmission/transmission/wiki/Release-Notes#transmission-192-20100314 | Release Notes Third Party Advisory | 
| https://trac.transmissionbt.com/ticket/1242 | Issue Tracking Vendor Advisory | 
| https://www.openwall.com/lists/oss-security/2010/04/01/9 | Mailing List Patch Third Party Advisory | 
Configurations
                    Information
                Published : 2019-10-30 16:15
Updated : 2020-08-18 08:05
NVD link : CVE-2010-0749
Mitre link : CVE-2010-0749
JSON object : View
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
                transmissionbt
- transmission
 
debian
- debian_linux
 
linux
- linux_kernel
 


