Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16744

Опубликовано: 13 сент. 2018
Источник: redhat
CVSS3: 4.1

Описание

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

Меры по смягчению последствий

Make sure the notify option in /etc/mgetty+sendfax/mgetty.config does not contain characters that can be possibly interpreted by the shell and that the file is readable and writable only by root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mgettyWill not fix
Red Hat Enterprise Linux 6mgettyWill not fix
Red Hat Enterprise Linux 7mgettyFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1629975mgetty: Command injection in faxrec.c

4.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

CVSS3: 7.8
nvd
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

CVSS3: 7.8
debian
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() i ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

suse-cvrf
больше 7 лет назад

Security update for mgetty

4.1 Medium

CVSS3