SB2017062622 - Fedora 24 update for libmtp



SB2017062622 - Fedora 24 update for libmtp

Published: June 26, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017062622
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Physical access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2017-9832)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

An integer overflow vulnerability in ptp-pack.c (ptp_unpack_OPL function) of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.


2) Integer overflow (CVE-ID: CVE-2017-9831)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.


Remediation

Install update from vendor's website.