Vulnerability Details : CVE-2010-0012
Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.
Vulnerability category: Directory traversal
Products affected by CVE-2010-0012
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.34:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.75:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.76:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.22:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0012
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0012
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-01-26 |
CWE ids for CVE-2010-0012
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0012
-
http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.diff.gz
404 Not FoundBroken Link
-
http://www.mail-archive.com/debian-devel-changes@lists.debian.org/msg264483.html
Accepted transmission 1.77-1 (source all amd64)
-
http://www.vupen.com/english/advisories/2010/0071
Webmail | OVH- OVHPermissions Required
-
http://www.debian.org/security/2010/dsa-1967
Debian -- Security Information -- DSA-1967-1 transmissionThird Party Advisory
-
http://secunia.com/advisories/38005
Sign inBroken Link
-
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
[security-announce] SUSE Security Announcement: acoread (SUSE-SA:2010:00Mailing List
-
http://secunia.com/advisories/37993
Sign inBroken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/55454
Transmission name directory traversal CVE-2010-0012 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://launchpad.net/bugs/500625
Bug #500625 “Local file overwriting due to directory traversal” : Bugs : transmission package : UbuntuIssue Tracking;Patch
-
http://www.openwall.com/lists/oss-security/2010/01/06/4
oss-security - Re: CVE Request: TransmissionMailing List
-
http://www.openwall.com/lists/oss-security/2010/01/06/2
oss-security - CVE Request: TransmissionMailing List
-
http://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg264483.html
Accepted transmission 1.77-1 (source all amd64)Patch
-
http://trac.transmissionbt.com/changeset/9829/
Changeset 9829 – TransmissionPatch
-
http://trac.transmissionbt.com/wiki/Changes#version-1.77
Changes – TransmissionBroken Link
Jump to