HylaFAX hfaxd with PAM Password Policy Bypass

high Nessus Plugin ID 20387

Synopsis

The remote fax server fails to properly validate passwords.

Description

The remote host is running HylaFAX, a fax / pager server application for Linux / unix.

The version of HylaFAX installed on the remote host does not check passwords when authenticating users via hfaxd, its fax server. An attacker can exploit this issue to bypass authentication using a valid username and gain access to the system.

Solution

Rebuild HylaFAX with PAM support or upgrade to HylaFAX version 4.2.4 or later.

See Also

http://bugs.hylafax.org//show_bug.cgi?id=682

http://www.hylafax.org/content/HylaFAX_4.2.4_release

Plugin Details

Severity: High

ID: 20387

File Name: hylafax_auth_bypass.nasl

Version: 1.17

Type: remote

Family: Misc.

Published: 1/10/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 1/4/2006

Reference Information

CVE: CVE-2005-3538

BID: 16150