HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
References
Configurations
History
No history.
Information
Published : 2018-09-21 17:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-17141
Mitre link : CVE-2018-17141
CVE.ORG link : CVE-2018-17141
JSON object : View
Products Affected
hylafax
- hylafax
- hylafax\+
debian
- debian_linux