CVE-2013-10064
Severity CVSS v4.0:
CRITICAL
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
05/08/2025
Last modified:
05/08/2025
Description
A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- http://www.actfax.com/
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/actfax_raw_server_bof.rb
- https://web.archive.org/web/20130212065755/http://www.pwnag3.com/2013/02/actfax-raw-server-exploit.html
- https://www.exploit-db.com/exploits/24467
- https://www.vulncheck.com/advisories/actfax-raw-server-buffer-overflow



