Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-16867

Опубликовано: 12 дек. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:3.1+dfsg-1package
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage
qemu-kvmremovedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg00390.html

  • https://git.qemu.org/?p=qemu.git;a=commit;h=c52d46e041b42bb1ee6f692e00a0abe37a9659f6 (master)

  • vulnerable code introduced in

  • https://git.qemu.org/?p=qemu.git;a=commit;h=88d5f381ecb2d2828fd77676572ff9a99da699fb

EPSS

Процентиль: 27%
0.0009
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.

CVSS3: 7
redhat
больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.

CVSS3: 7.8
nvd
больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.

CVSS3: 7.8
github
около 3 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usb_mtp_write_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.

oracle-oval
больше 6 лет назад

ELSA-2018-4313: qemu security update (IMPORTANT)

EPSS

Процентиль: 27%
0.0009
Низкий