Логотип exploitDog
bind:CVE-2018-16872
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16872

Количество 17

Количество 17

ubuntu логотип

CVE-2018-16872

больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-16872

больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2018-16872

больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-16872

больше 6 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP). The code openi ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-w3c5-x9c8-47hc

около 3 лет назад

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2020-00749

около 7 лет назад

Уязвимость реализации протокола qemu Media Transfer Protocol эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить несанкционированный доступ к информации

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0471-2

около 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0471-1

больше 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:0254-1

около 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0435-1

больше 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0423-1

больше 6 лет назад

Security update for qemu

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4518

больше 6 лет назад

ELSA-2019-4518: qemu security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0489-1

больше 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1074-1

около 6 лет назад

Security update for qemu

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0582-1

больше 6 лет назад

Security update for qemu

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4556

больше 6 лет назад

ELSA-2019-4556: qemu security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4585

больше 6 лет назад

ELSA-2019-4585: qemu security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16872

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-16872

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-16872

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-16872

A flaw was found in qemu Media Transfer Protocol (MTP). The code openi ...

CVSS3: 5.3
0%
Низкий
больше 6 лет назад
github логотип
GHSA-w3c5-x9c8-47hc

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-00749

Уязвимость реализации протокола qemu Media Transfer Protocol эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить несанкционированный доступ к информации

CVSS3: 5.3
0%
Низкий
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0471-2

Security update for qemu

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0471-1

Security update for qemu

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0254-1

Security update for qemu

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0435-1

Security update for qemu

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0423-1

Security update for qemu

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4518

ELSA-2019-4518: qemu security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0489-1

Security update for qemu

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1074-1

Security update for qemu

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0582-1

Security update for qemu

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4556

ELSA-2019-4556: qemu security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-4585

ELSA-2019-4585: qemu security update (IMPORTANT)

больше 6 лет назад

Уязвимостей на страницу