Korean
<< Back
VID 16118
Severity 40
Port 4559
Protocol TCP
Class FTP
Detailed Description The HylaFAX hfaxd server is vulnerable to a password check vulnerability. HylaFAX is an open-source fax and paging system for Unix-based operating systems. HylaFAX versions 4.2.0 through 4.2.3 could allow a remote attacker to access using arbitrary password, caused by improper password checking when authenticating users via hfaxd, its fax server. A remote attacker could gain unauthorized access to the affected server using a valid username.

* References:
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=682
http://www.hylafax.org/content/HylaFAX_4.2.4_release
http://www.frsirt.com/english/advisories/2006/0072

* Platforms Affected:
Silicon Graphics Corporation, HylaFAX versions 4.2.0 through 4.2.3
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of HylaFAX (4.2.4 or later), available from the HylaFAX Web page at http://freshmeat.net/projects/hylafax/?topic_id=36
Related URL CVE-2005-3538 (CVE)
Related URL 16150 (SecurityFocus)
Related URL 24004 (ISS)