Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-16744

Опубликовано: 13 сент. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.6
CVSS3: 7.8

Описание

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
cosmic

ignored

end of life
devel

not-affected

1.2.1-1
disco

not-affected

1.2.1-1
eoan

not-affected

1.2.1-1
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

1.2.1-1
esm-apps/jammy

not-affected

1.2.1-1
esm-apps/noble

not-affected

1.2.1-1
esm-apps/xenial

needs-triage

Показывать по

EPSS

Процентиль: 70%
0.00645
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 4.1
redhat
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

CVSS3: 7.8
nvd
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

CVSS3: 7.8
debian
больше 7 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() i ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

suse-cvrf
больше 7 лет назад

Security update for mgetty

EPSS

Процентиль: 70%
0.00645
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3