Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-1010190 CVE-2019-1010189 |
CWE-ID | CWE-125 CWE-835 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Mgetty+Sendfax Client/Desktop applications / Other client software |
Vendor | EDV-Beratung Gert Döring |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU19971
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2019-1010190
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the "putwhitespan()" function of mgetty in the "g3/pbm2g3.c" file. A remote attacker can create a specially crafted file, trick a victim to open it, trigger out-of-bounds read error and crash the affected application, results in a DoS condition.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMgetty+Sendfax: 1.1.0 - 1.1.37-Jun05
CPE2.3https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
https://mgetty.greenie.net/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU19977
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-1010189
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in g3/g32pbm.c. A remote attacker can create a specially crafted file, pass it to the application and consume all available system resources and cause denial of service conditions.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMgetty+Sendfax: 1.2.0
CPE2.3 External linkshttps://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.