QEMU File Handling Multiple Directory Traversal Vulnerabilities

QEMU is prone to multiple directory-traversal vulnerabilities because the application fails to sufficiently sanitize user-supplied input.

Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve arbitrary files from the affected system in the context of the application. Information obtained could aid in further attacks.

Note: These issues was previously titled 'QEMU File Handling Directory Traversal Vulnerability'. The title has been changed to better reflect the vulnerability information.


Privacy Statement
Copyright 2010, SecurityFocus