7.2
CVSSv2

CVE-2018-16741

Published: 13/09/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in mgetty prior to 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mgetty project mgetty

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #910448 mgetty: CVE-2018-16741 Package: src:mgetty; Maintainer for src:mgetty is Andreas Barth &lt;aba@ayousorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Sat, 6 Oct 2018 13:21:02 UTC Severity: grave Tags: patch, security, upstream Found in version mgetty/1136-1 Fixed in ...
Two input sanitization failures have been found in the faxrunq and faxq binaries in mgetty, a smart modem getty replacement An attacker could leverage them to insert commands via shell metacharacters in jobs id and have them executed with the privilege of the faxrunq/faxq user For the stable distribution (stretch), this problem has been fixed in ...
A command injection was discovered in mgetty in the faxrunq script used to send queued faxes The shell script faxrunq does not properly escape the arguments passed to faxsend before evaluating the command allowing a user, who has permissions to queue faxes in the system, to execute arbitrary command with elevated privileges ...