Directory Traversal Affecting flightgear package, versions <3.0.0-5+deb8u2


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Directory Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN8-FLIGHTGEAR-310171
  • published12 May 2017
  • disclosed12 May 2017

Introduced: 12 May 2017

CVE-2017-8921  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade Debian:8 flightgear to version 3.0.0-5+deb8u2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream flightgear package and not the flightgear package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

In FlightGear before 2017.2.1, the FGCommand interface allows overwriting any file the user has write access to, but not with arbitrary data: only with the contents of a FlightGear flightplan (XML). A resource such as a malicious third-party aircraft could exploit this to damage files belonging to the user. Both this issue and CVE-2016-9956 are directory traversal vulnerabilities in Autopilot/route_mgr.cxx - this one exists because of an incomplete fix for CVE-2016-9956.