Vulnerability CVE-2018-16744: Information

Description

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

Severity: HIGH (7.8) Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Published: Sept. 13, 2018
Modified: Oct. 3, 2019
Error type identifier: CWE-78

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
mgettysisyphus1.2.1-alt11.2.1-alt1ALT-PU-2020-3522-1263574Fixed
mgettyp101.2.1-alt11.2.1-alt1ALT-PU-2020-3522-1263574Fixed
mgettyp91.2.1-alt11.2.1-alt1ALT-PU-2020-3533-1263575Fixed
mgettyc10f11.2.1-alt11.2.1-alt1ALT-PU-2020-3522-1263574Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty
  • Exploit
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:mgetty_project:mgetty:*:*:*:*:*:*:*:*
      End excliding
      1.2.1