CVE-2014-4909
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
29/07/2014
Last modified:
12/04/2025
Description
Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* | ||
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:* | 2.83 (including) | |
cpe:2.3:a:transmissionbt:transmission:0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.70:*:*:*:*:*:*:* | ||
cpe:2.3:a:transmissionbt:transmission:0.71:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://inertiawar.com/submission.go
- http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html
- http://secunia.com/advisories/59897
- http://secunia.com/advisories/60108
- http://secunia.com/advisories/60527
- http://www.debian.org/security/2014/dsa-2988
- http://www.openwall.com/lists/oss-security/2014/07/10/4
- http://www.openwall.com/lists/oss-security/2014/07/11/5
- http://www.osvdb.org/108997
- http://www.securityfocus.com/bid/68487
- http://www.ubuntu.com/usn/USN-2279-1
- https://bugs.gentoo.org/show_bug.cgi?id=516822
- https://bugzilla.redhat.com/show_bug.cgi?id=1118290
- https://trac.transmissionbt.com/wiki/Changes#version-2.84
- https://twitter.com/benhawkes/statuses/484378151959539712
- http://inertiawar.com/submission.go
- http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html
- http://secunia.com/advisories/59897
- http://secunia.com/advisories/60108
- http://secunia.com/advisories/60527
- http://www.debian.org/security/2014/dsa-2988
- http://www.openwall.com/lists/oss-security/2014/07/10/4
- http://www.openwall.com/lists/oss-security/2014/07/11/5
- http://www.osvdb.org/108997
- http://www.securityfocus.com/bid/68487
- http://www.ubuntu.com/usn/USN-2279-1
- https://bugs.gentoo.org/show_bug.cgi?id=516822
- https://bugzilla.redhat.com/show_bug.cgi?id=1118290
- https://trac.transmissionbt.com/wiki/Changes#version-2.84
- https://twitter.com/benhawkes/statuses/484378151959539712