Integer overflow in libmtp (Alpine package)



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9831
CWE-ID CWE-190
Exploitation vector Local
Public exploit N/A
Vulnerable software
libmtp (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Integer overflow

EUVDB-ID: #VU33053

Risk: Medium

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-9831

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.

Mitigation

Install update from vendor's website.

Vulnerable software versions

libmtp (Alpine package): 1.1.10-r0 - 1.1.12-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=c54b435a73c6d6000080895918997ad6541e4425
https://git.alpinelinux.org/aports/commit/?id=03bc091f0abf0c6ab23af90e7a648b81cf9a6b5e
https://git.alpinelinux.org/aports/commit/?id=0ab6e365fa72b2f59576a69b8a8be16f1bd2fe87
https://git.alpinelinux.org/aports/commit/?id=330f754f59d7cc8bdd3c7e4ecf31978eaa613129


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###