Transmissionbt Transmission up to 1.81 bitfield.c tr_bitfieldEnsureNthBitAlloced numeric error
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Transmissionbt Transmission up to 1.81. Affected by this vulnerability is the function tr_bitfieldEnsureNthBitAlloced of the file bitfield.c. The manipulation leads to numeric error.
This vulnerability is traded as CVE-2014-4909. There is no exploit available.
You should upgrade the affected component.
Details
A vulnerability, which was classified as critical, has been found in Transmissionbt Transmission up to 1.81. This issue affects the function tr_bitfieldEnsureNthBitAlloced of the file bitfield.c. The manipulation with an unknown input leads to a numeric error vulnerability. Using CWE to declare the problem leads to CWE-189. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write.
The weakness was shared 07/29/2014 by Ben Hawkes (Website). It is possible to read the advisory at twitter.com. The identification of this vulnerability is CVE-2014-4909 since 07/11/2014. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit.
The vulnerability scanner Nessus provides a plugin with the ID 77128 (openSUSE Security Update : transmission (openSUSE-SU-2014:0980-1)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family SuSE Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 122417 (Fedora Security Update for transmission (FEDORA-2014-8331)).
Upgrading to version 1.82 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (94453), Tenable (77128), SecurityFocus (BID 68487†), OSVDB (108997†) and Secunia (SA59897†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Vendor
Name
Version
- 1.0
- 1.1
- 1.2
- 1.3
- 1.4
- 1.5
- 1.6
- 1.7
- 1.8
- 1.9
- 1.10
- 1.11
- 1.12
- 1.13
- 1.14
- 1.15
- 1.16
- 1.17
- 1.18
- 1.19
- 1.20
- 1.21
- 1.22
- 1.23
- 1.24
- 1.25
- 1.26
- 1.27
- 1.28
- 1.29
- 1.30
- 1.31
- 1.32
- 1.33
- 1.34
- 1.35
- 1.36
- 1.37
- 1.38
- 1.39
- 1.40
- 1.41
- 1.42
- 1.43
- 1.44
- 1.45
- 1.46
- 1.47
- 1.48
- 1.49
- 1.50
- 1.51
- 1.52
- 1.53
- 1.54
- 1.55
- 1.56
- 1.57
- 1.58
- 1.59
- 1.60
- 1.61
- 1.62
- 1.63
- 1.64
- 1.65
- 1.66
- 1.67
- 1.68
- 1.69
- 1.70
- 1.71
- 1.72
- 1.73
- 1.74
- 1.75
- 1.76
- 1.77
- 1.78
- 1.79
- 1.80
- 1.81
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 77128
Nessus Name: openSUSE Security Update : transmission (openSUSE-SU-2014:0980-1)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 702988
OpenVAS Name: Debian Security Advisory DSA 2988-1 (transmission - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Transmission 1.82
Timeline
07/10/2014 🔍07/10/2014 🔍
07/11/2014 🔍
07/15/2014 🔍
07/29/2014 🔍
07/29/2014 🔍
07/30/2014 🔍
08/12/2014 🔍
03/26/2015 🔍
12/15/2024 🔍
Sources
Advisory: USN-2279-1Researcher: Ben Hawkes
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-4909 (🔍)
GCVE (CVE): GCVE-0-2014-4909
GCVE (VulDB): GCVE-100-70499
OVAL: 🔍
X-Force: 94453
SecurityFocus: 68487 - Transmission Out of Bounds Memory Corruption Vulnerability
Secunia: 59897 - Transmission "tr_bitfieldEnsureNthBitAlloced()" Integer Overflow Denial of Servi, Moderately Critical
OSVDB: 108997
Vulnerability Center: 45644 - Transmission Before 2.84 Remote DoS and Code Execution Vulnerability due to Integer Overflow in bitfield.c, Medium
Entry
Created: 03/26/2015 12:07Updated: 12/15/2024 09:55
Changes: 03/26/2015 12:07 (71), 06/03/2017 07:37 (7), 03/26/2022 11:22 (3), 03/26/2022 11:29 (1), 12/15/2024 09:55 (25)
Complete: 🔍
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.