Описание
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | ignored | end of life |
| devel | not-affected | 1.2.1-1 |
| disco | not-affected | 1.2.1-1 |
| eoan | not-affected | 1.2.1-1 |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | not-affected | 1.2.1-1 |
| esm-apps/jammy | not-affected | 1.2.1-1 |
| esm-apps/noble | not-affected | 1.2.1-1 |
| esm-apps/xenial | needs-triage |
Показывать по
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() i ...
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
Уязвимость функции fax_notify_mail пакета mgetty операционных систем Red Hat Enterprise Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3