CVE-2010-0012
moderate-risk
Published 2010-01-08
Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.
Do I need to act?
-
0.30% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (8)
Affected Vendors
References (26)
Broken Link
http://secunia.com/advisories/37993
Broken Link
http://secunia.com/advisories/38005
Third Party Advisory
http://www.debian.org/security/2010/dsa-1967
Permissions Required
http://www.vupen.com/english/advisories/2010/0071
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/55454
Issue Tracking
https://launchpad.net/bugs/500625
Broken Link
http://secunia.com/advisories/37993
Broken Link
http://secunia.com/advisories/38005
Third Party Advisory
http://www.debian.org/security/2010/dsa-1967
and 6 more references
45
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate