plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-18299 plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, contains an HTTP message parsing function that takes a user-defined path and writes non-user controlled data as SYSTEM to the file when the extract_files parameter is used. This occurs without properly authenticating the user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T06:10:10.255Z

Reserved: 2018-02-02T00:00:00

Link: CVE-2018-6547

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-13T16:29:01.127

Modified: 2024-11-21T04:10:52.803

Link: CVE-2018-6547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses