Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hh3x-6q43-46x2

Опубликовано: 05 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.

A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.

EPSS

Процентиль: 98%
0.63827
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121

Связанные уязвимости

nvd
6 месяцев назад

A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.

EPSS

Процентиль: 98%
0.63827
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121