First published: Tue Jun 30 2020(Updated: )
HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hylafax\+ Project Hylafax\+ | <=7.0.2 | |
Ifax Hylafax Enterprise |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.