CVE-2018-16743

Impact:
Low
Public Date:
2018-09-13
CWE:
CWE-121
Bugzilla:
1629973: CVE-2018-16743 mgetty: Stack-based buffer overflow with long username in contrib/next-login/login.c

The MITRE CVE dictionary describes this issue as:

An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.

Find out more about CVE-2018-16743 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of mgetty as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the patched login binary provided by mgetty.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 2.9
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector Local
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 mgetty Not affected
Red Hat Enterprise Linux 6 mgetty Not affected
Red Hat Enterprise Linux 5 mgetty Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.