Vulnerability Details : CVE-2005-3538
hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
Products affected by CVE-2005-3538
- cpe:2.3:a:ifax_solutions:hylafax:4.2.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3538
2.81%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3538
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3538
-
http://www.hylafax.org/archive/2005-12/msg00119.php
-
http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml
HylaFAX: Multiple vulnerabilities (GLSA 200601-03) — Gentoo securityPatch
-
http://www.securityfocus.com/archive/1/420974/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/0072
Site en construction
-
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719
Bug 719 - Unsanitised user-supplied data passed to eval in notify and faxrcvdPatch
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:015
Mandriva
-
http://www.securityfocus.com/bid/16150
Patch
-
http://www.hylafax.org/content/HylaFAX_4.2.4_release
HylaFAX 4.2.4 release - hylafax.org
Jump to