HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-09-21T17:00:00
Updated: 2024-08-05T10:39:59.554Z
Reserved: 2018-09-17T00:00:00
Link: CVE-2018-17141
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-09-21T17:29:07.063
Modified: 2024-11-21T03:53:56.647
Link: CVE-2018-17141
Redhat
No data.