Total vulnerabilities in the database
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
hylafax / hylafax+ | 5.6.0 | 5.6.0.x |
hylafax / hylafax | 6.0.6 | 6.0.6.x |