Description
plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-18299 | plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user. |
References
| Link | Providers |
|---|---|
| https://www.securifera.com/advisories/CVE-2018-6547/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T06:10:10.255Z
Reserved: 2018-02-02T00:00:00.000Z
Link: CVE-2018-6547
No data.
Status : Modified
Published: 2018-04-13T16:29:01.127
Modified: 2024-11-21T04:10:52.803
Link: CVE-2018-6547
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD