CVE-2018-17141
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
21/09/2018
Last modified:
07/11/2023
Description
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hylafax:hylafax:6.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hylafax:hylafax\+:5.6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.hylafax.org/HylaFAX?a=commit%3Bh%3Dc6cac8d8cd0dbe313689ba77023e12bc5b3027be
- http://www.openwall.com/lists/oss-security/2018/09/20/1
- https://lists.debian.org/debian-lts-announce/2018/09/msg00026.html
- https://seclists.org/bugtraq/2018/Sep/49
- https://www.debian.org/security/2018/dsa-4298
- https://www.x41-dsec.de/lab/advisories/x41-2018-008-hylafax/



