Vulnerability Name: | CVE-2006-3126 (CCN-28774) | ||||||||||||
Assigned: | 2006-09-01 | ||||||||||||
Published: | 2006-09-01 | ||||||||||||
Updated: | 2011-03-08 | ||||||||||||
Summary: | c2faxrecv in capi4hylafax 01.02.03 allows remote attackers to execute arbitrary commands via null (\0) and shell metacharacters in the TSI string, as demonstrated by a fax from an anonymous number. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:UR)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:UR)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MISC Type: Patch http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474 Source: MITRE Type: CNA CVE-2006-3126 Source: CCN Type: freshmeat.net CAPI4Hylafax Source: SECUNIA Type: Patch, Vendor Advisory 21722 Source: CCN Type: SA21726 Capi4Hylafax Shell Command Injection Source: SECUNIA Type: Patch, Vendor Advisory 21726 Source: SECUNIA Type: UNKNOWN 22450 Source: GENTOO Type: UNKNOWN GLSA-200610-05 Source: DEBIAN Type: UNKNOWN DSA-1165 Source: DEBIAN Type: DSA-1165 capi4hylafax -- missing input sanitising Source: CCN Type: GLSA-200610-05 CAPI4Hylafax fax receiver: Execution of arbitrary code Source: SUSE Type: UNKNOWN SUSE-SR:2007:004 Source: CCN Type: OSVDB ID: 28308 Capi4Hylafax c2faxrecv TSI String Processing Arbitrary Command Injection Source: BID Type: UNKNOWN 19801 Source: CCN Type: BID-19801 CAPI4Hylafax Remote Arbitrary Command Execution Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-3430 Source: XF Type: UNKNOWN capi4hylafax-c2faxrecv-command-execution(28774) Source: SUSE Type: SUSE-SR:2007:004 SUSE Security Summary Report | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |