Vulnerability CVE-2018-16741: Information
Description
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command.
Severity: HIGH (7.8) Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Fixed packages
Package name | Branch | Fixed in version | Version from repository | Errata ID | Task # | State |
---|---|---|---|---|---|---|
mgetty | sisyphus | 1.2.1-alt1 | 1.2.1-alt1 | ALT-PU-2020-3522-1 | 263574 | Fixed |
mgetty | p10 | 1.2.1-alt1 | 1.2.1-alt1 | ALT-PU-2020-3522-1 | 263574 | Fixed |
mgetty | p9 | 1.2.1-alt1 | 1.2.1-alt1 | ALT-PU-2020-3533-1 | 263575 | Fixed |
mgetty | c10f1 | 1.2.1-alt1 | 1.2.1-alt1 | ALT-PU-2020-3522-1 | 263574 | Fixed |
References to Advisories, Solutions, and Tools
Hyperlink | Resource |
---|---|
https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty |
|
DSA-4291 |
|
[debian-lts-announce] 20180912 [SECURITY] [DLA 1502-1] mgetty security update |
|