Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Hylafax\+
(Hylafax\+_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-06-30 | CVE-2020-15396 | In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root. | Fedora, Hylafax\+, Hylafax_enterprise, Backports_sle, Leap | 7.8 | ||
2020-06-30 | CVE-2020-15397 | HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root). | Hylafax\+, Hylafax_enterprise | 7.8 |