hfaxd in HylaFAX before 4.2.1, when installed with a weak hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Hylafax | Hylafax | 4.1.1 (including) | 4.1.1 (including) |
Hylafax | Hylafax | 4.1.2 (including) | 4.1.2 (including) |
Hylafax | Hylafax | 4.1.3 (including) | 4.1.3 (including) |
Hylafax | Hylafax | 4.1.5 (including) | 4.1.5 (including) |
Hylafax | Hylafax | 4.1.6 (including) | 4.1.6 (including) |
Hylafax | Hylafax | 4.1.7 (including) | 4.1.7 (including) |
Hylafax | Hylafax | 4.1.8 (including) | 4.1.8 (including) |
Hylafax | Hylafax | 4.1_beta1 (including) | 4.1_beta1 (including) |
Hylafax | Hylafax | 4.1_beta2 (including) | 4.1_beta2 (including) |
Hylafax | Hylafax | 4.1_beta3 (including) | 4.1_beta3 (including) |
Hylafax | Hylafax | 4.2.0 (including) | 4.2.0 (including) |
Hylafax | Ubuntu | dapper | * |
Hylafax | Ubuntu | devel | * |
Hylafax | Ubuntu | edgy | * |
Hylafax | Ubuntu | feisty | * |