Описание
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-1182
- http://marc.info/?l=bugtraq&m=110546971307585&w=2
- http://marc.info/?l=hylafax&m=110545119911558&w=2
- http://secunia.com/advisories/13812
- http://security.gentoo.org/glsa/glsa-200501-21.xml
- http://www.debian.org/security/2004/dsa-634
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:006
EPSS
CVE ID
Связанные уязвимости
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfax ...
EPSS