HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
{ "binaries": [ { "binary_name": "hylafax-client", "binary_version": "3:6.0.6-6+deb8u1build0.16.04.1" }, { "binary_name": "hylafax-server", "binary_version": "3:6.0.6-6+deb8u1build0.16.04.1" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-17141.json"
{ "binaries": [ { "binary_name": "hylafax-client", "binary_version": "3:6.0.6-8.1~ubuntu0.18.04.1" }, { "binary_name": "hylafax-server", "binary_version": "3:6.0.6-8.1~ubuntu0.18.04.1" } ], "availability": "No subscription required" }