First published: Sat Dec 31 2005(Updated: )
Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hylafax+ | =4.1.1 | |
Hylafax+ | =4.2 | |
Hylafax+ | =4.2.1 | |
Hylafax+ | =4.2.2 | |
Hylafax+ | =4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3539 has a medium severity rating due to the potential for remote command execution.
To fix CVE-2005-3539, upgrade to HylaFAX version 4.2.4 or later.
CVE-2005-3539 affects HylaFAX versions 4.2.0 to 4.2.3.
CVE-2005-3539 contains multiple eval injection vulnerabilities that allow arbitrary command execution.
Yes, CVE-2005-3539 can be exploited remotely by attackers.