A flaw was found in qemu Media Transfer Protocol (MTP) before version 3.1.0. A path traversal in the in usbmtpwrite_data function in hw/usb/dev-mtp.c due to an improper filename sanitization. When the guest device is mounted in read-write mode, this allows to read/write arbitrary files which may lead do DoS scenario OR possibly lead to code execution on the host.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc0"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "3.1.0-rc3"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "29"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.10"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16867.json"