Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9149

Опубликовано: 22 мая 2017
Источник: debian
EPSS Низкий

Описание

Metadata Anonymisation Toolkit (MAT) 0.6 and 0.6.1 silently fails to perform "Clean metadata" actions upon invocation from the Nautilus contextual menu, which allows context-dependent attackers to obtain sensitive information by reading a file for which cleaning had been attempted.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
matfixed0.6.1-4package
matnot-affectedjessiepackage
matnot-affectedwheezypackage

Примечания

  • https://0xacab.org/mat/mat/issues/11527

  • Fixed by: https://0xacab.org/mat/mat/commit/94ca62a429bb6a3a5f293de26053e54bbfeea9f9

  • Fixed by: https://0xacab.org/mat/mat/commit/8f6303a1f26fe8dad83ba96ab8328dbdfa3af59a

  • Introduced by: https://0xacab.org/mat/mat/commit/0d1fe2555e90db35eeb531a1b6026ff64f1f5ae5

EPSS

Процентиль: 51%
0.00277
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

Metadata Anonymisation Toolkit (MAT) 0.6 and 0.6.1 silently fails to perform "Clean metadata" actions upon invocation from the Nautilus contextual menu, which allows context-dependent attackers to obtain sensitive information by reading a file for which cleaning had been attempted.

CVSS3: 7.5
nvd
больше 8 лет назад

Metadata Anonymisation Toolkit (MAT) 0.6 and 0.6.1 silently fails to perform "Clean metadata" actions upon invocation from the Nautilus contextual menu, which allows context-dependent attackers to obtain sensitive information by reading a file for which cleaning had been attempted.

CVSS3: 7.5
github
больше 3 лет назад

Metadata Anonymisation Toolkit (MAT) 0.6 and 0.6.1 silently fails to perform "Clean metadata" actions upon invocation from the Nautilus contextual menu, which allows context-dependent attackers to obtain sensitive information by reading a file for which cleaning had been attempted.

EPSS

Процентиль: 51%
0.00277
Низкий