Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16745

Опубликовано: 13 сент. 2018
Источник: redhat
CVSS3: 3.9

Описание

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.

Меры по смягчению последствий

Make sure the notify option in /etc/mgetty+sendfax/mgetty.config does not contain more than 150 characters and that the file is readable and writable only by root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mgettyWill not fix
Red Hat Enterprise Linux 6mgettyWill not fix
Red Hat Enterprise Linux 7mgettyFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1629979mgetty: Stack-based buffer overflow in fax_notify_mail() in faxrec.c

3.9 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.

CVSS3: 7.8
nvd
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.

CVSS3: 7.8
debian
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() i ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.

CVSS3: 2.9
fstec
больше 7 лет назад

Уязвимость функции fax_notify_mail пакета mgetty операционных систем Red Hat Enterprise Linux, позволяющая нарушителю вызвать отказ в обслуживании

3.9 Low

CVSS3