hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200501-21.xml | patch vendor advisory |
http://www.debian.org/security/2004/dsa-634 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:006 | vendor advisory |
http://marc.info/?l=bugtraq&m=110546971307585&w=2 | mailing list |
http://marc.info/?l=hylafax&m=110545119911558&w=2 | mailing list |
http://secunia.com/advisories/13812 | third party advisory |