Vulnerability Description
An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mgetty Project | Mgetty | < 1.2.1 |
Related Weaknesses (CWE)
References
- https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgettyExploitThird Party Advisory
- https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgettyExploitThird Party Advisory
FAQ
What is CVE-2018-16743?
CVE-2018-16743 is a vulnerability with a CVSS score of 7.8 (HIGH). An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
How severe is CVE-2018-16743?
CVE-2018-16743 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16743?
Check the references section above for vendor advisories and patch information. Affected products include: Mgetty Project Mgetty.