An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1502-1 | mgetty security update |
Debian DSA |
DSA-4291-1 | mgetty security update |
EUVD |
EUVD-2018-8541 | An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate <jobid>" command. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:32:53.779Z
Reserved: 2018-09-09T00:00:00
Link: CVE-2018-16741
No data.
Status : Modified
Published: 2018-09-13T16:29:00.280
Modified: 2024-11-21T03:53:16.420
Link: CVE-2018-16741
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD