hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
2004-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | hylafax | hylafax | 4.1.1 | Yes |
Application | hylafax | hylafax | 4.1.2 | Yes |
Application | hylafax | hylafax | 4.1.3 | Yes |
Application | hylafax | hylafax | 4.1.5 | Yes |
Application | hylafax | hylafax | 4.1.6 | Yes |
Application | hylafax | hylafax | 4.1.7 | Yes |
Application | hylafax | hylafax | 4.1.8 | Yes |
Application | hylafax | hylafax | 4.1_beta1 | Yes |
Application | hylafax | hylafax | 4.1_beta2 | Yes |
Application | hylafax | hylafax | 4.1_beta3 | Yes |
Application | hylafax | hylafax | 4.2.0 | Yes |