hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 - Patch | |
References | () http://secunia.com/advisories/18314 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18337 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/18489 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml - Patch | |
References | () http://www.hylafax.org/archive/2005-12/msg00119.php - | |
References | () http://www.hylafax.org/content/HylaFAX_4.2.4_release - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:015 - | |
References | () http://www.securityfocus.com/archive/1/420974/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16150 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0072 - |
Information
Published : 2005-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-3538
Mitre link : CVE-2005-3538
CVE.ORG link : CVE-2005-3538
JSON object : View
Products Affected
ifax_solutions
- hylafax
CWE