oss-sec mailing list archives

CVE Request -- Transmission v1.92


From: Jan Lieskovsky <jlieskov () redhat com>
Date: Wed, 17 Mar 2010 18:22:20 +0100

Hi Steve, vendors,

  Transmission upstream has recently released latest, v1.92 version:
    [1] http://trac.transmissionbt.com/wiki/Changes

  fixing one (potentially two) security issues:
    a, Fix potential buffer overflow when adding maliciously-crafted magnet links

  References:
    [2] http://trac.transmissionbt.com/ticket/2965
    [3] http://trac.transmissionbt.com/wiki/Changes
    [4] http://bugs.gentoo.org/show_bug.cgi?id=309831

    --

    b, Fix possible data corruption issue caused by data sent by bad peers during endgame
       (this one I am not completely sure of, but when looking at the relevant bug record:
    [5] http://trac.transmissionbt.com/ticket/1242
        there is written:
    [6] http://trac.transmissionbt.com/ticket/1242#comment:1
        "My theory is that for some reason Transmission will download a corrupt part
         from someone but not realize it until you do a manual verify. At this point
         T will recognize the bad part and redownload it from the same person, which
        just causes the problem again."

        so to prevent someone from successfully downloading content of some torrent file,
        for an attacker to should be enough to download a part of it, corrupt it and
        share it. Not sure about the algorithm, Transmission decides which torrent
        to retrieve content from, but if it is deterministic / predictable behavior /
        algorithm, such attack could succeed).

  References:
    [7] http://trac.transmissionbt.com/ticket/1242
    [8] http://trac.transmissionbt.com/ticket/1242#comment:1
    [9] http://trac.transmissionbt.com/wiki/Changes

Could you allocate CVE id(s) for this / these issue(s)?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team



Current thread: