summary refs log tree commit diff stats
path: root/mailinglist/output_launchpad/1812451
diff options
context:
space:
mode:
Diffstat (limited to 'mailinglist/output_launchpad/1812451')
-rw-r--r--mailinglist/output_launchpad/181245117
1 files changed, 17 insertions, 0 deletions
diff --git a/mailinglist/output_launchpad/1812451 b/mailinglist/output_launchpad/1812451
new file mode 100644
index 00000000..eefba8e7
--- /dev/null
+++ b/mailinglist/output_launchpad/1812451
@@ -0,0 +1,17 @@
+In windows host, tftp arbitrary file read vulnerability
+
+https://github.com/qemu/qemu/blob/master/slirp/tftp.c#L343
+
+  if (!strncmp(req_fname, "../", 3) ||
+      req_fname[strlen(req_fname) - 1] == '/' ||
+      strstr(req_fname, "/../")) {
+      tftp_send_error(spt, 2, "Access violation", tp);
+      return;
+  }
+
+There are file path check for not allowing escape tftp directory.
+But, in windows, file path is separated by "\" backslash.
+So, guest can read arbitrary file in Windows host.
+
+This is fixed upstream by https://gitlab.freedesktop.org/slirp/libslirp/commit/14ec36e107a8c9af7d0a80c3571fe39b291ff1d4
+