Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-9831 |
CWE-ID | CWE-190 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
libmtp (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU33053
Risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2017-9831
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local non-authenticated attacker to execute arbitrary code.
An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
MitigationInstall update from vendor's website.
Vulnerable software versionslibmtp (Alpine package): 1.1.10-r0 - 1.1.12-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=c54b435a73c6d6000080895918997ad6541e4425
https://git.alpinelinux.org/aports/commit/?id=03bc091f0abf0c6ab23af90e7a648b81cf9a6b5e
https://git.alpinelinux.org/aports/commit/?id=0ab6e365fa72b2f59576a69b8a8be16f1bd2fe87
https://git.alpinelinux.org/aports/commit/?id=330f754f59d7cc8bdd3c7e4ecf31978eaa613129
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.