Описание
Security update for mgetty
This update for mgetty fixes the following issues:
-
CVE-2018-16741: Fixed a command injection in fax/faxq-helper.c (boo#1108752)
-
CVE-2018-16742: Stack-based buffer overflow in contrib/scrts.c triggered via command line parameter (boo#1108762)
-
CVE-2018-16743: Stack-based buffer overflow with long username in contrib/next-login/login.c (boo#1108761)
-
CVE-2018-16744: Command injection in faxrec.c (boo#1108757)
-
CVE-2018-16745: Stack-based buffer overflow in fax_notify_mail() in faxrec.c (boo#1108756)
-
sets maximum length of a string to prevent buffer overflow and thus possible command injection
-
The obsolete contrib/scrts.c tool was deleted, which contained a buffer overflow.
Список пакетов
openSUSE Leap 42.3
Ссылки
- E-Mail link for openSUSE-SU-2018:3108-1
- SUSE Security Ratings
Описание
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command.
Затронутые продукты
Ссылки
- CVE-2018-16741
- SUSE Bug 1108752
Описание
An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
Затронутые продукты
Ссылки
- CVE-2018-16742
- SUSE Bug 1108762
Описание
An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
Затронутые продукты
Ссылки
- CVE-2018-16743
- SUSE Bug 1108761
Описание
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
Затронутые продукты
Ссылки
- CVE-2018-16744
- SUSE Bug 1108757
Описание
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
Затронутые продукты
Ссылки
- CVE-2018-16745
- SUSE Bug 1108756