Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-1010190

Опубликовано: 25 июл. 2019
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5mgettyOut of support scope
Red Hat Enterprise Linux 6mgettyOut of support scope
Red Hat Enterprise Linux 7mgettyFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1740487mgetty: out-of-bounds read in function putwhitespan() in g3/pbm2g3.c causing denial of service

EPSS

Процентиль: 38%
0.00165
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

CVSS3: 5.5
nvd
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

CVSS3: 5.5
debian
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact i ...

suse-cvrf
почти 6 лет назад

Security update for mgetty

suse-cvrf
почти 6 лет назад

Security update for mgetty

EPSS

Процентиль: 38%
0.00165
Низкий

5.6 Medium

CVSS3