Описание
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 3:6.0.6-8.1~ubuntu0.18.04.1 |
| cosmic | released | 3:6.0.6-8.1~ubuntu0.18.10.1 |
| devel | not-affected | 3:6.0.6-8.1 |
| disco | not-affected | 3:6.0.6-8.1 |
| esm-apps/bionic | released | 3:6.0.6-8.1~ubuntu0.18.04.1 |
| esm-apps/xenial | released | 3:6.0.6-6+deb8u1build0.16.04.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | trusty was needed |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arb ...
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
7.5 High
CVSS2
9.8 Critical
CVSS3