First published: Fri Dec 31 2004(Updated: )
hfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hylafax+ | =4.1.8 | |
Hylafax+ | =4.1_beta1 | |
Hylafax+ | =4.1.6 | |
Hylafax+ | =4.1.7 | |
Hylafax+ | =4.1.2 | |
Hylafax+ | =4.1.1 | |
Hylafax+ | =4.1_beta2 | |
Hylafax+ | =4.1.3 | |
Hylafax+ | =4.1_beta3 | |
Hylafax+ | =4.2.0 | |
Hylafax+ | =4.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1182 is classified as a medium severity vulnerability related to authentication bypass in HylaFAX.
To fix CVE-2004-1182, upgrade to HylaFAX version 4.2.1 or later which addresses this vulnerability.
CVE-2004-1182 affects HylaFAX versions prior to 4.2.1 including 4.1.1, 4.1.2, 4.1.3, and other versions up to 4.2.0.
An attacker can exploit CVE-2004-1182 to authenticate and bypass access restrictions by manipulating the username or hostname.
Yes, there are known exploit methods for CVE-2004-1182 that allow attackers to gain unauthorized access.