Summary
The remote host is missing updates announced in
advisory GLSA 200501-21.
Solution
All HylaFAX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/hylafax-4.2.0-r2'
Note: Due to heightened security, weak entries in the hosts.hfaxd file may no longer work. Please see the HylaFAX documentation for details of accepted syntax in the hosts.hfaxd file.
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200501-21 http://bugs.gentoo.org/show_bug.cgi?id=75941
http://marc.theaimsgroup.com/?l=hylafax&m=110545119911558&w=2
Insight
HylaFAX is subject to a vulnerability in its username matching code, potentially allowing remote users to bypass access control lists.
Severity
Classification
-
CVE CVE-2004-1182 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities