CVE-2010-0748

9.8 CRITICAL

📋 TL;DR

This vulnerability in Transmission BitTorrent client allows attackers to cause denial of service (crash) or potentially execute arbitrary code via specially crafted magnet links containing excessive 'tr' arguments. It affects Transmission users running versions before 1.92 who process malicious magnet links.

💻 Affected Systems

Products:
  • Transmission BitTorrent Client
Versions: All versions before 1.92
Operating Systems: Linux, macOS, Windows, FreeBSD
Default Config Vulnerable: ⚠️ Yes
Notes: All Transmission installations before version 1.92 are vulnerable regardless of configuration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise

🟠

Likely Case

Application crash causing denial of service

🟢

If Mitigated

No impact if patched or workarounds applied

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious magnet links from any source
🏢 Internal Only: MEDIUM - Requires user interaction to process malicious links

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to click/process malicious magnet link, but no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.92 and later

Vendor Advisory: https://github.com/transmission/transmission/wiki/Release-Notes#transmission-192-20100314

Restart Required: Yes

Instructions:

1. Download Transmission 1.92 or later from official sources. 2. Stop Transmission service. 3. Install new version. 4. Restart Transmission service.

🔧 Temporary Workarounds

Disable magnet link handling

all

Prevent Transmission from processing magnet links

Edit Transmission config to disable magnet link association

Network filtering

all

Block malicious magnet links at network perimeter

🧯 If You Can't Patch

  • Isolate Transmission instances from untrusted networks
  • Implement strict user education about clicking unknown magnet links

🔍 How to Verify

Check if Vulnerable:

Check Transmission version with 'transmission-daemon --version' or in GUI

Check Version:

transmission-daemon --version

Verify Fix Applied:

Confirm version is 1.92 or higher

📡 Detection & Monitoring

Log Indicators:

  • Application crashes
  • Unusually long magnet link processing

Network Indicators:

  • Multiple failed connection attempts after magnet link processing

SIEM Query:

source="transmission.log" AND ("crash" OR "segfault" OR "magnet:")

🔗 References

📤 Share & Export