Name | CVE-2018-17141 |
Description | HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1515-1, DSA-4298-1 |
Debian Bugs | 909161 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
hylafax (PTS) | jessie, jessie (lts) | 3:6.0.6-6+deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 3:6.0.6-7+deb9u1 | fixed |
| buster | 3:6.0.6-8.1 | fixed |
| bullseye | 3:6.0.7-3.1 | fixed |
| bookworm | 3:6.0.7-5 | fixed |
| sid, trixie | 3:6.0.7-11 | fixed |
The information below is based on the following data on fixed versions.
Notes
http://git.hylafax.org/HylaFAX?a=commit;h=82fa7bdbffc253de4d3e80a87d47fdbf68eabe36