blob: 634a42450e2cfd82fbe661f157c8a85cc2364692 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-21">
<title>HylaFAX: hfaxd unauthorized login vulnerability</title>
HylaFAX is subject to a vulnerability in its username matching code,
potentially allowing remote users to bypass access control lists.
<product type="ebuild">HylaFAX</product>
<announced>January 11, 2005</announced>
<revised>January 11, 2005: 01</revised>
<package name="net-misc/hylafax" auto="yes" arch="*">
<unaffected range="ge">4.2.0-r2</unaffected>
<vulnerable range="lt">4.2.0-r2</vulnerable>
HylaFAX is a software package for sending and receiving facsimile
The code used by hfaxd to match a given username and hostname with
an entry in the hosts.hfaxd file is insufficiently protected against
malicious entries.
<impact type="normal">
If the HylaFAX installation uses a weak hosts.hfaxd file, a remote
attacker could authenticate using a malicious username or hostname and
bypass the intended access restrictions.
As a workaround, administrators may consider adding passwords to
all entries in the hosts.hfaxd file.
All HylaFAX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/hylafax-4.2.0-r2&quot;</code>
Note: Due to heightened security, weak entries in the
hosts.hfaxd file may no longer work. Please see the HylaFAX
documentation for details of accepted syntax in the hosts.hfaxd file.
<uri link="">CAN-2004-1182</uri>
<uri link=";m=110545119911558&amp;w=2">HylaFAX Announcement</uri>
<metadata tag="requester" timestamp="Mon, 10 Jan 2005 09:56:02 +0000">
<metadata tag="submitter" timestamp="Mon, 10 Jan 2005 13:48:18 +0000">
<metadata tag="bugReady" timestamp="Tue, 11 Jan 2005 16:16:35 +0000">