HylaFAX: hfaxd unauthorized login vulnerability
Gentoo Linux Security Advisory
||GLSA 200501-21 / HylaFAX
||January 11, 2005
||January 11, 2005: 01
All supported architectures
HylaFAX is subject to a vulnerability in its username matching code,
potentially allowing remote users to bypass access control lists.
HylaFAX is a software package for sending and receiving facsimile
The code used by hfaxd to match a given username and hostname with
an entry in the hosts.hfaxd file is insufficiently protected against
If the HylaFAX installation uses a weak hosts.hfaxd file, a remote
attacker could authenticate using a malicious username or hostname and
bypass the intended access restrictions.
As a workaround, administrators may consider adding passwords to
all entries in the hosts.hfaxd file.
All HylaFAX users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.0-r2"
Note: Due to heightened security, weak entries in the
hosts.hfaxd file may no longer work. Please see the HylaFAX
documentation for details of accepted syntax in the hosts.hfaxd file.