HylaFAX+ 5.2.4 < 5.5.4 Remote Buffer Overflow

medium Nessus Plugin ID 76348

Synopsis

The remote host contains an application that is affected by a heap-based remote buffer overflow vulnerability.

Description

According to its version number, the HylaFAX+ install hosted on the remote web server is 5.2.4 or later and prior to 5.5.4. It is, therefore, affected by a heap-based remote buffer overflow vulnerability.

The flaw exists when 'hfaxd' is compiled with support for LDAP. The user input for LDAP authentication is not properly validated. This could allow a remote attacker to cause a denial of service or execute arbitrary code.

Note that Nessus has not tested for this issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to version 5.5.4 or later.

See Also

http://hylafax.sourceforge.net/news/5.5.4.php

https://seclists.org/bugtraq/2013/Sep/148

Plugin Details

Severity: Medium

ID: 76348

File Name: hylafax_5_5_4.nasl

Version: 1.5

Type: remote

Family: Misc.

Published: 7/2/2014

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:hylafax:hylafax

Required KB Items: Settings/ParanoidReport, hylafax/installed, hylafax/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2013

Vulnerability Publication Date: 7/31/2013

Reference Information

CVE: CVE-2013-5680

BID: 62729