Path traversal in QEMU - CVE-2016-7116
Published: December 10, 2016 / Updated: August 9, 2020
QEMU
Detailed vulnerability description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in hw/9pfs/9p.c in QEMU (aka Quick Emulator). A remote authenticated attacker can send a specially crafted HTTP request and local guest OS administrators to access host files outside the export path via a . (dot dot) in an unspecified string.
How to mitigate CVE-2016-7116
Sources
- http://git.qemu.org/?p=qemu.git;a=commit;h=56f101ecce0eafd09e2daf1c4eeb1377d6959261
- http://www.openwall.com/lists/oss-security/2016/08/30/1
- http://www.openwall.com/lists/oss-security/2016/08/30/3
- http://www.securityfocus.com/bid/92680
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03917.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04231.html
- https://security.gentoo.org/glsa/201609-01