[Secure-testing-team] Bug#576331: Transmission 1.92 fixes two security issues

Moritz Muehlenhoff jmm at debian.org
Sat Apr 3 12:26:46 UTC 2010


Package: transmission
Severity: grave
Tags: security

The message below was reported on oss-security. CVE-2010-0749 seems
like a regular bug to me, not necessarily security-relevant, but
please upload transmission 1.92 ASAP. 

Lenny isn't affected, it doesn't have support for Magnet links yet.

On a side note: Given that most Bittorrent trackers seem to block
older clients, I think we should change the update policy for Squeeze
and always introduce the recent version in stable point updates.
What do you think?

Cheers,
        Moritz

>    Transmission upstream has recently released latest, v1.92 version:
>      [1] http://trac.transmissionbt.com/wiki/Changes
>
>    fixing one (potentially two) security issues:
>      a, Fix potential buffer overflow when adding maliciously-crafted
>      magnet links
>
>    References:
>      [2] http://trac.transmissionbt.com/ticket/2965
>      [3] http://trac.transmissionbt.com/wiki/Changes
>      [4] http://bugs.gentoo.org/show_bug.cgi?id=309831

> Use CVE-2010-0748 for this one. I'm calling it an arbitrary memory write.
> It's not really a buffer overflow.

>      b, Fix possible data corruption issue caused by data sent by bad
>      peers during endgame (this one I am not completely sure of, but when
>      looking at the relevant bug record:
>      [5] http://trac.transmissionbt.com/ticket/1242
>          there is written:
>      [6] http://trac.transmissionbt.com/ticket/1242#comment:1
>          "My theory is that for some reason Transmission will download a
>          corrupt part from someone but not realize it until you do a
>          manual verify. At this point T will recognize the bad part and
>          redownload it from the same person, which just causes the
>          problem again."
>
>          so to prevent someone from successfully downloading content of
>          some torrent file, for an attacker to should be enough to
>          download a part of it, corrupt it and
>          share it. Not sure about the algorithm, Transmission decides
>          which torrent
>          to retrieve content from, but if it is deterministic /
>          predictable behavior / algorithm, such attack could succeed).
>
>    References:
>      [7] http://trac.transmissionbt.com/ticket/1242
>      [8] http://trac.transmissionbt.com/ticket/1242#comment:1
>      [9] http://trac.transmissionbt.com/wiki/Changes
>

> I'm giving this issue a CVE ID too. I think this issue is a bit on the
> fence, but given a malicious client could corrupt download data in a manner
> that is hard to fix, it should get one.

> Use CVE-2010-0749

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-3-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15 at euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages transmission depends on:
pn  transmission-cli              <none>     (no description available)
pn  transmission-common           <none>     (no description available)
pn  transmission-gtk              <none>     (no description available)

transmission recommends no packages.

transmission suggests no packages.





More information about the Secure-testing-team mailing list