12 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

30 Jun 2020 — HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root). HylaFAX+ versiones hasta 7.0.2 y HylaFAX Enterprise, presentan scripts que ejecutan archivos binarios desde directorios escritos por usuarios no privilegiados (por ejemplo, ubicaciones en /var/spoo... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

30 Jun 2020 — In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root. En HylaFAX+ versiones hasta 7.0.2 y HylaFAX Enterprise, la utilidad de configuración del fax llama chown sobre archivos en directorios propiedad del usuario. Al ganar una carrera, un atacante local podría usar esto para escalar sus privilegios para root Multiple vulnerabilities have been found in HylaFAX,... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.8EPSS: 6%CPEs: 4EXPL: 3

20 Sep 2018 — HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file. HylaFAX 6.0.6 y HylaFAX+ 5.6.0 permite que los atacantes remotos ejecuten código arbitrario mediante una sesión dial-in que proporciona una página FAX con el bit JPEG habilitado, el cual se manipula incorrectamente en FaxModem::writeECMData() en el archivo faxd/CopyQuality.... • http://git.hylafax.org/HylaFAX?a=commit%3Bh=c6cac8d8cd0dbe313689ba77023e12bc5b3027be • CWE-787: Out-of-bounds Write CWE-824: Access of Uninitialized Pointer •

CVSS: 9.8EPSS: 31%CPEs: 5EXPL: 2

31 Dec 2005 — Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3. • https://www.exploit-db.com/exploits/27032 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

27 Sep 2005 — xferfaxstats in HylaFax 4.2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on the xferfax$$ temporary file. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

27 Sep 2005 — HylaFax 4.2.1 and earlier does not create or verify ownership of the UNIX domain socket, which might allow local users to read faxes and cause a denial of service by creating the socket using the hyla.unix temporary file. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

31 Dec 2004 — hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password. • http://marc.info/?l=bugtraq&m=110546971307585&w=2 •

CVSS: 10.0EPSS: 7%CPEs: 7EXPL: 1

12 Nov 2003 — Format string vulnerability in hfaxd for Hylafax 4.1.7 and earlier allows remote attackers to execute arbitrary code. Vulnerabilidad de cadena de formato en Hylafax 4.1.7 y anteriores permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/23371 •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

04 Oct 2002 — Format string vulnerability in HylaFAX faxgetty before 4.1.3 allows remote attackers to cause a denial of service (crash) via the TSI data element. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0358.html •

CVSS: 9.8EPSS: 3%CPEs: 10EXPL: 0

04 Oct 2002 — Buffer overflow in HylaFAX faxgetty before 4.1.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long line of image data. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0358.html •