Lucene search

K
gentooGentoo FoundationGLSA-200311-03
HistoryNov 10, 2003 - 12:00 a.m.

HylaFAX: Remote code exploit in hylafax

2003-11-1000:00:00
Gentoo Foundation
security.gentoo.org
12

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.136 Low

EPSS

Percentile

95.6%

Background

HylaFAX is a popular client-server fax package.

Description

During a code review of the hfaxd server, the SuSE Security Team discovered a format bug condition that allows a remote attacker to execute arbitrary code as the root user. However, the bug cannot be triggered in the default hylafax configuration.

Impact

A remote attacker could execute arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

Users are encouraged to perform an ‘emerge sync’ and upgrade the package to the latest available version. Vulnerable versions of hylafax have been removed from portage. Specific steps to upgrade:

 # emerge sync
 # emerge -pv '>=net-misc/hylafax-4.1.8'
 # emerge '>=net-misc/hylafax-4.1.8'
 # emerge clean
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/hylafax<= 4.1.7UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.136 Low

EPSS

Percentile

95.6%