hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://secunia.com/advisories/18314 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/18337 | third-party-advisory x_refsource_SECUNIA |
http://www.hylafax.org/content/HylaFAX_4.2.4_release | x_refsource_CONFIRM |
http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml | vendor-advisory x_refsource_GENTOO |
http://www.hylafax.org/archive/2005-12/msg00119.php | mailing-list x_refsource_MLIST |
http://secunia.com/advisories/18489 | third-party-advisory x_refsource_SECUNIA |
http://www.securityfocus.com/archive/1/420974/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 | x_refsource_MISC |
http://www.vupen.com/english/advisories/2006/0072 | vdb-entry x_refsource_VUPEN |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:015 | vendor-advisory x_refsource_MANDRIVA |
http://www.securityfocus.com/bid/16150 | vdb-entry x_refsource_BID |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
hfaxd in HylaFAX 4.2.3, when PAM support is disabled, accepts arbitrary passwords, which allows remote attackers to gain privileges.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |