CVE-2018-17141

HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
debiandebian_linux
8.0
debiandebian_linux
9.0
hylafaxhylafax
6.0.6
hylafaxhylafax\+
5.6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
hylafax
bullseye
3:6.0.7-3.1
fixed
bookworm
3:6.0.7-5
fixed
sid
3:6.0.7-11
fixed
trixie
3:6.0.7-11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
hylafax
disco
not-affected
cosmic
Fixed 3:6.0.6-8.1~ubuntu0.18.10.1
released
bionic
Fixed 3:6.0.6-8.1~ubuntu0.18.04.1
released
xenial
Fixed 3:6.0.6-6+deb8u1build0.16.04.1
released
trusty
dne