CVE-2005-3539 – Hylafax 4.1/4.2 (Multiple Scripts) - Remote Command Execution
https://notcve.org/view.php?id=CVE-2005-3539
Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3. • https://www.exploit-db.com/exploits/27032 http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 http://secunia.com/advisories/18314 http://secunia.com/advisories/18337 http://secunia.com/advisories/18366 http://secunia.com/advisories/18489 http://www.debian.org/security/2005/dsa-933 http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml http://www.hylafax.org/content/HylaFAX_4.2.4_release http://www.mandriva.com/security/advisories?name=MDKSA-2006:015 http:/ •
CVE-2005-3070
https://notcve.org/view.php?id=CVE-2005-3070
HylaFax 4.2.1 and earlier does not create or verify ownership of the UNIX domain socket, which might allow local users to read faxes and cause a denial of service by creating the socket using the hyla.unix temporary file. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 http://secunia.com/advisories/17107 http://www.mandriva.com/security/advisories?name=MDKSA-2005:177 http://www.securityfocus.com/bid/15043 •
CVE-2004-1182
https://notcve.org/view.php?id=CVE-2004-1182
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password. • http://marc.info/?l=bugtraq&m=110546971307585&w=2 http://marc.info/?l=hylafax&m=110545119911558&w=2 http://secunia.com/advisories/13812 http://security.gentoo.org/glsa/glsa-200501-21.xml http://www.debian.org/security/2004/dsa-634 http://www.mandriva.com/security/advisories?name=MDKSA-2005:006 •
CVE-2003-0886 – Hylafax 4.1.x - HFaxD Format String
https://notcve.org/view.php?id=CVE-2003-0886
Format string vulnerability in hfaxd for Hylafax 4.1.7 and earlier allows remote attackers to execute arbitrary code. Vulnerabilidad de cadena de formato en Hylafax 4.1.7 y anteriores permite a atacantes remotos ejecutar código arbitrario. • https://www.exploit-db.com/exploits/23371 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000783 http://marc.info/?l=bugtraq&m=106858898708752&w=2 http://www.debian.org/security/2003/dsa-401 http://www.mandriva.com/security/advisories?name=MDKSA-2003:105 http://www.novell.com/linux/security/advisories/2003_045_hylafax.html •
CVE-2002-1050
https://notcve.org/view.php?id=CVE-2002-1050
Buffer overflow in HylaFAX faxgetty before 4.1.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long line of image data. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0358.html http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=312 http://www.debian.org/security/2002/dsa-148 http://www.iss.net/security_center/static/9729.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:055 http://www.novell.com/linux/security/advisories/2002_035_hylafax.html http://www.securityfocus.com/bid/5349 •