CVE-2018-17141

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:hylafax:hylafax:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:hylafax:hylafax\+:5.6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-09-21 17:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-17141

Mitre link : CVE-2018-17141

CVE.ORG link : CVE-2018-17141


JSON object : View

Products Affected

hylafax

  • hylafax\+
  • hylafax

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write

CWE-824

Access of Uninitialized Pointer