First published: Thu Mar 01 2018(Updated: )
In cryptctl before version 2.0 a malicious server could send RPC requests that could overwrite files outside of the cryptctl key database.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Cryptctl | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9270 is critical with a CVSS score of 9.1.
The affected software for CVE-2017-9270 is cryptctl version 2.0 on Opensuse.
A malicious server can exploit CVE-2017-9270 by sending RPC requests that could overwrite files outside of the cryptctl key database.
You can find more information about CVE-2017-9270 on the following links: [link1](https://bugzilla.suse.com/show_bug.cgi?id=1041963), [link2](https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00022.html), [link3](https://www.suse.com/de-de/security/cve/CVE-2017-9270/)
The CWE categories for CVE-2017-9270 are CWE-20: Improper Input Validation and CWE-22: Improper Limitation of a Pathname to a Restricted Directory.