Mgetty Project

Mgetty

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 24.07.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:18:02

mgetty prior to version 1.2.1 is affected by: Infinite Loop. The impact is: DoS, the program does never terminates. The component is: g3/g32pbm.c. The attack vector is: Local, the user should open a specially crafted file. The fixed version is: 1.2.1...

  • EPSS 0.17%
  • Veröffentlicht 24.07.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:02

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted fi...

Exploit
  • EPSS 0.65%
  • Veröffentlicht 13.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:16

An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 13.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:16

An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 13.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:16

An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.

Exploit
  • EPSS 0.65%
  • Veröffentlicht 13.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:16

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 13.09.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:17

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.

  • EPSS 0.06%
  • Veröffentlicht 18.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

faxrunqd.in in mgetty 1.1.28 and earlier allows local users to overwrite files via a symlink attack on JOB files.