Descriptionhfaxd in HylaFAX before 4.2.1, when installed with a "weak" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SR:2005:003, published Wednesday, Feb 4th 2005 15:00 MEST
SUSE Timeline for this CVECVE page created: Fri Jun 28 01:05:42 2013
CVE page last modified: Fri Oct 7 12:45:29 2022