Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3.
Link | Tags |
---|---|
http://secunia.com/advisories/18314 | patch vendor advisory third party advisory |
http://www.securityfocus.com/bid/16151 | patch vdb entry exploit |
http://secunia.com/advisories/18366 | third party advisory |
http://secunia.com/advisories/18337 | patch vendor advisory third party advisory |
http://www.hylafax.org/content/HylaFAX_4.2.4_release | |
http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml | patch vendor advisory |
http://secunia.com/advisories/18489 | third party advisory |
http://www.debian.org/security/2005/dsa-933 | vendor advisory |
http://www.securityfocus.com/archive/1/420974/100/0/threaded | mailing list |
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 | |
http://www.vupen.com/english/advisories/2006/0072 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:015 | vendor advisory |