ID CVE-2005-3538
Summary hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
References
Vulnerable Configurations
  • cpe:2.3:a:ifax_solutions:hylafax:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:ifax_solutions:hylafax:4.2.3:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:36)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 16150
bugtraq 20060105 HylaFAX Security advisory - fixed in HylaFAX 4.2.4
confirm http://www.hylafax.org/content/HylaFAX_4.2.4_release
gentoo GLSA-200601-03
mandriva MDKSA-2006:015
misc http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719
mlist [hylafax-users] 20051212 Re: proceedure for hylafax setup for PAM authentiation
secunia
  • 18314
  • 18337
  • 18489
vupen ADV-2006-0072
Last major update 19-10-2018 - 15:36
Published 31-12-2005 - 05:00
Last modified 19-10-2018 - 15:36
Back to Top