Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-56vg-g8vf-f4v4

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

EPSS

Процентиль: 91%
0.06165
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-824

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

CVSS3: 9.8
nvd
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

CVSS3: 9.8
debian
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arb ...

suse-cvrf
больше 7 лет назад

Security update for hylafax+

suse-cvrf
больше 7 лет назад

Security update for hylafax+

EPSS

Процентиль: 91%
0.06165
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-824