Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2002:055: hylafax Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the hylafax package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2002:055 (hylafax).
Numerous vulnerabilities in the HylaFAX product exist in versions prior to
4.1.3. It does not check the TSI string which is received from remote FAX
systems before using it in logging and other places. A remote sender using a
specially formatted TSI string can cause the faxgetty program to segfault,
resulting in a denial of service. Format string vulnerabilities were also
discovered by Christer Oberg, which exist in a number of utilities bundled with
HylaFax, such as faxrm, faxalter, faxstat, sendfax, sendpage, and faxwatch. If
any of these tools are setuid, they could be used to elevate system rights.
Mandrake Linux does not, by default, install these tools setuid. Finally, Lee
Howard discovered that faxgetty would segfault due to a buffer overflow after
receiving a very large line of image data. This vulnerability could conceivably
be used to execute arbitrary commands on the system as root, and could also be
exploited more easily as a denial of sevice.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2002:055
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.