CVE-2015-7888
CVSS7.8
发布时间 :2017-06-07 10:29:00
修订时间 :2017-06-14 10:49:36
NMP    

[原文]Directory traversal vulnerability in the WifiHs20UtilityService on the Samsung S6 Edge LRX22G.G925VVRU1AOE2 allows remote attackers to overwrite or create arbitrary files as the system-level user via a .. (dot dot) in the name of a file, compressed into a zipped file named cred.zip, and downloaded to /sdcard/Download.


[CNNVD]CNNVD数据暂缺。


[机译]帮助我们改进 Google 翻译

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7888
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7888
(官方数据源) NVD

- 其它链接及资源

http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html
(VENDOR_ADVISORY)  MISC  http://packetstormsecurity.com/files/134104/Samsung-WifiHs20UtilityService-Path-Traversal.html
http://www.securityfocus.com/bid/77338
(VENDOR_ADVISORY)  BID  77338
https://bugs.chromium.org/p/project-zero/issues/detail?id=489&q=samsung&redir=1
(VENDOR_ADVISORY)  MISC  https://bugs.chromium.org/p/project-zero/issues/detail?id=489&q=samsung&redir=1

- 漏洞信息 (F134104)

Samsung WifiHs20UtilityService Path Traversal (PacketStormID:F134104)
2015-10-27 00:00:00
Google Security Research,markbrand  
exploit,arbitrary
linux
CVE-2015-7888
[点击下载]

A path traversal vulnerability was found in the WifiHs20UtilityService. This service is running on a Samsung S6 Edge device, and may be present on other Samsung device models. WifiHs20UtilityService reads any files placed in /sdcard/Download/cred.zip, and unzips this file into /data/bundle. Directory traversal in the path of the zipped contents allows an attacker to write a controlled file to an arbitrary path as the system user.

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站