Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-17141

Опубликовано: 21 сент. 2018
Источник: debian
EPSS Низкий

Описание

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hylafaxfixed3:6.0.6-8.1package

Примечания

  • http://git.hylafax.org/HylaFAX?a=commit;h=82fa7bdbffc253de4d3e80a87d47fdbf68eabe36

EPSS

Процентиль: 91%
0.06165
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

CVSS3: 9.8
nvd
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

suse-cvrf
больше 7 лет назад

Security update for hylafax+

suse-cvrf
больше 7 лет назад

Security update for hylafax+

CVSS3: 9.8
github
больше 3 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

EPSS

Процентиль: 91%
0.06165
Низкий