Vulnerability Details : CVE-2014-4909
Potential exploit
Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2014-4909
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.51:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.60:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.50:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.52:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.34:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.75:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.76:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.91:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.93:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.90:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.83:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.72:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.04:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.96:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.91:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.71:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.72:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.33:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.40:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.01:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.02:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.21:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.22:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.42:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.50:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.80:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.77:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.90:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.80:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.74:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.81:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.1:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.02:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.05:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.93:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.70:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.54:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.32:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.31:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.00:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.20:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.92:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.81:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.82:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.82:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.06:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.20:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.95:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.01:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.73:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.42:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.41:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.21:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.03:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.04:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.30:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.31:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.51:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.52:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.03:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.00:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:0.94:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.53:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.61:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:1.30:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.32:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.33:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.40:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.41:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.72:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.70:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.60:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.61:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.71:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.75:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.74:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.82:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.81:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.80:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.73:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.77:*:*:*:*:*:*:*
- cpe:2.3:a:transmissionbt:transmission:2.76:*:*:*:*:*:*:*
Threat overview for CVE-2014-4909
Top countries where our scanners detected CVE-2014-4909
Top open port discovered on systems with this issue
4567
IPs affected by CVE-2014-4909 386
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-4909!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-4909
7.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-4909
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2014-4909
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-4909
-
http://inertiawar.com/submission.go
404 Not FoundExploit
-
https://bugs.gentoo.org/show_bug.cgi?id=516822
516822 – <net-p2p/transmission-2.84: peer communication vulnerability (CVE-2014-4909)
-
http://www.securityfocus.com/bid/68487
Transmission Out of Bounds Memory Corruption Vulnerability
-
http://www.ubuntu.com/usn/USN-2279-1
USN-2279-1: Transmission vulnerability | Ubuntu security notices
-
https://twitter.com/benhawkes/statuses/484378151959539712
Ben Hawkes on Twitter: "Transmission (default bittorrent client in most Linux distros) fixed a tricky 32-bit only issue. Test case: http://t.co/4kqb5LnY9r"
-
https://bugzilla.redhat.com/show_bug.cgi?id=1118290
1118290 – (CVE-2014-4909) CVE-2014-4909 transmission: peer communication vulnerability
-
http://www.debian.org/security/2014/dsa-2988
Debian -- Security Information -- DSA-2988-1 transmission
-
http://www.openwall.com/lists/oss-security/2014/07/10/4
oss-security - CVE request: transmission peer communication vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html
[SECURITY] Fedora 20 Update: transmission-2.84-1.fc20
-
http://www.openwall.com/lists/oss-security/2014/07/11/5
oss-security - Re: CVE request: transmission peer communication vulnerability
-
http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html
openSUSE-SU-2014:0980-1: moderate: transmission
-
https://trac.transmissionbt.com/wiki/Changes#version-2.84
Changes – TransmissionVendor Advisory
Jump to