HylaFAX: hfaxd unauthorized login vulnerability HylaFAX is subject to a vulnerability in its username matching code, potentially allowing remote users to bypass access control lists. HylaFAX 2005-01-11 2005-01-11 75941 remote 4.2.0-r2 4.2.0-r2

HylaFAX is a software package for sending and receiving facsimile messages.

The code used by hfaxd to match a given username and hostname with an entry in the hosts.hfaxd file is insufficiently protected against malicious entries.

If the HylaFAX installation uses a weak hosts.hfaxd file, a remote attacker could authenticate using a malicious username or hostname and bypass the intended access restrictions.

As a workaround, administrators may consider adding passwords to all entries in the hosts.hfaxd file.

All HylaFAX users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.0-r2"

Note: Due to heightened security, weak entries in the hosts.hfaxd file may no longer work. Please see the HylaFAX documentation for details of accepted syntax in the hosts.hfaxd file.

CAN-2004-1182 HylaFAX Announcement koon koon koon