First published: Mon Apr 02 2007(Updated: )
Directory traversal vulnerability in torrent.cpp in KTorrent before 2.1.3 only checks for the ".." string, which allows remote attackers to overwrite arbitrary files via modified ".." sequences in a torrent filename, as demonstrated by "../" sequences, due to an incomplete fix for CVE-2007-1384.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
joris guisson KTorrent | =2.1.1 | |
joris guisson KTorrent | =2.1.2 | |
KTorrent | =2.1.1 | |
KTorrent | =2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1799 is considered to be a high-severity vulnerability due to its potential to allow remote attackers to overwrite arbitrary files.
To mitigate CVE-2007-1799, upgrade KTorrent to version 2.1.3 or later, which contains the necessary security patches.
KTorrent versions 2.1.1 and 2.1.2 are vulnerable to CVE-2007-1799.
CVE-2007-1799 is a directory traversal vulnerability that allows file overwriting.
The developer of the affected software KTorrent is Joris Guisson.