Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2002:055: hylafax Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the hylafax package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2002:055 (hylafax).

Numerous vulnerabilities in the HylaFAX product exist in versions prior to
4.1.3. It does not check the TSI string which is received from remote FAX
systems before using it in logging and other places. A remote sender using a
specially formatted TSI string can cause the faxgetty program to segfault,
resulting in a denial of service. Format string vulnerabilities were also
discovered by Christer Oberg, which exist in a number of utilities bundled with
HylaFax, such as faxrm, faxalter, faxstat, sendfax, sendpage, and faxwatch. If
any of these tools are setuid, they could be used to elevate system rights.
Mandrake Linux does not, by default, install these tools setuid. Finally, Lee
Howard discovered that faxgetty would segfault due to a buffer overflow after
receiving a very large line of image data. This vulnerability could conceivably
be used to execute arbitrary commands on the system as root, and could also be
exploited more easily as a denial of sevice.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.