Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-17141

Опубликовано: 21 сент. 2018
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:hylafax:hylafax:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:hylafax:hylafax\+:5.6.0:*:*:*:*:*:*:*

EPSS

Процентиль: 91%
0.06165
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

CVSS3: 9.8
debian
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arb ...

suse-cvrf
больше 7 лет назад

Security update for hylafax+

suse-cvrf
больше 7 лет назад

Security update for hylafax+

CVSS3: 9.8
github
больше 3 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

EPSS

Процентиль: 91%
0.06165
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787