Multiple vulnerabilities in mgetty



Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2019-1010190
CVE-2019-1010189
CWE-ID CWE-125
CWE-835
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Mgetty+Sendfax
Client/Desktop applications / Other client software

Vendor EDV-Beratung Gert Döring

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU19971

Risk: Medium

CVSSv4.0: 5.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2019-1010190

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the "putwhitespan()" function of mgetty in the "g3/pbm2g3.c" file. A remote attacker can create a specially crafted file, trick a victim to open it, trigger out-of-bounds read error and crash the affected application, results in a DoS condition.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mgetty+Sendfax: 1.1.0 - 1.1.37-Jun05

CPE2.3 External links

https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
https://mgetty.greenie.net/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Infinite loop

EUVDB-ID: #VU19977

Risk: Low

CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-1010189

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in g3/g32pbm.c. A remote attacker can create a specially crafted file, pass it to the application and consume all available system resources and cause denial of service conditions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mgetty+Sendfax: 1.2.0

CPE2.3 External links

https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###