Description
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
References (6)
Scores
CVSS v3
9.8
EPSS
0.0587
EPSS Percentile
90.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-787
CWE-824
Status
published
Products (4)
debian/debian_linux
8.0
debian/debian_linux
9.0
hylafax/hylafax
6.0.6
hylafax/hylafax\+
5.6.0
Published
Sep 21, 2018
Tracked Since
Feb 18, 2026