Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.2.2020.2368
Category:Huawei EulerOS Local Security Checks
Title:Huawei EulerOS: Security Advisory for mgetty (EulerOS-SA-2020-2368)
Summary:The remote host is missing an update for the Huawei EulerOS; 'mgetty' package(s) announced via the EulerOS-SA-2020-2368 advisory.
Description:Summary:
The remote host is missing an update for the Huawei EulerOS
'mgetty' package(s) announced via the EulerOS-SA-2020-2368 advisory.

Vulnerability Insight:
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the , , or characters within a file created by the 'faxq-helper activate ' command.(CVE-2018-16741)

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.(CVE-2018-16744)

An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.(CVE-2018-16745)

Affected Software/OS:
'mgetty' package(s) on Huawei EulerOS V2.0SP2.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-16741
Common Vulnerability Exposure (CVE) ID: CVE-2018-16744
Common Vulnerability Exposure (CVE) ID: CVE-2018-16745
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.