Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-17141

Опубликовано: 21 сент. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 9.8

Описание

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

РелизСтатусПримечание
bionic

released

3:6.0.6-8.1~ubuntu0.18.04.1
cosmic

released

3:6.0.6-8.1~ubuntu0.18.10.1
devel

not-affected

3:6.0.6-8.1
disco

not-affected

3:6.0.6-8.1
esm-apps/bionic

released

3:6.0.6-8.1~ubuntu0.18.04.1
esm-apps/xenial

released

3:6.0.6-6+deb8u1build0.16.04.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needed

Показывать по

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

CVSS3: 9.8
debian
больше 7 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arb ...

suse-cvrf
больше 7 лет назад

Security update for hylafax+

suse-cvrf
больше 7 лет назад

Security update for hylafax+

CVSS3: 9.8
github
больше 3 лет назад

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.

7.5 High

CVSS2

9.8 Critical

CVSS3