First published: Sat Dec 10 2016(Updated: )
Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
QEMU KVM | =2.7.0-rc0 | |
QEMU KVM | =2.7.0-rc1 | |
QEMU KVM | =2.7.0-rc2 | |
QEMU KVM | =2.7.0-rc3 | |
QEMU KVM | =2.7.0-rc4 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7116 is classified as a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2016-7116, upgrade to QEMU versions 2.7.0 or later, where the vulnerability is addressed.
CVE-2016-7116 affects QEMU versions up to and including 2.6.2 and specific release candidates of version 2.7.0.
CVE-2016-7116 can be exploited through directory traversal attacks, allowing local guest OS administrators to access unauthorized host files.
Local guest OS administrators using affected versions of QEMU are primarily impacted by CVE-2016-7116.