Vulnerabilities > CVE-2005-3539 - Unspecified vulnerability in Hylafax
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Exploit-Db
description | Hylafax 4.1/4.2 Multiple Scripts Remote Command Execution Vulnerability. CVE-2005-3539. Remote exploit for linux platform |
id | EDB-ID:27032 |
last seen | 2016-02-03 |
modified | 2006-01-05 |
published | 2006-01-05 |
reporter | Patrice Fournier |
source | https://www.exploit-db.com/download/27032/ |
title | Hylafax 4.1/4.2 - Multiple Scripts Remote Command Execution Vulnerability |
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2006-015.NASL description Patrice Fournier discovered the faxrcvd/notify scripts (executed as the uucp/fax user) run user-supplied input through eval without any attempt at sanitising it first. This would allow any user who could submit jobs to HylaFAX, or through telco manipulation control the representation of callid information presented to HylaFAX to run arbitrary commands as the uucp/fax user. (CVE-2005-3539, only last seen 2020-06-01 modified 2020-06-02 plugin id 20794 published 2006-01-22 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20794 title Mandrake Linux Security Advisory : hylafax (MDKSA-2006:015) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2006:015. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(20794); script_version ("1.15"); script_cvs_date("Date: 2019/08/02 13:32:48"); script_cve_id("CVE-2005-3538", "CVE-2005-3539"); script_xref(name:"MDKSA", value:"2006:015"); script_name(english:"Mandrake Linux Security Advisory : hylafax (MDKSA-2006:015)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Patrice Fournier discovered the faxrcvd/notify scripts (executed as the uucp/fax user) run user-supplied input through eval without any attempt at sanitising it first. This would allow any user who could submit jobs to HylaFAX, or through telco manipulation control the representation of callid information presented to HylaFAX to run arbitrary commands as the uucp/fax user. (CVE-2005-3539, only 'notify' in the covered versions) Updated packages were also reviewed for vulnerability to an issue where if PAM is disabled, a user could log in with no password. (CVE-2005-3538) In addition, some fixes to the packages for permissions, and the %pre/%post scripts were backported from cooker. (#19679) The updated packages have been patched to correct these issues." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:hylafax"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:hylafax-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:hylafax-server"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64hylafax4.2.0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64hylafax4.2.0-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libhylafax4.2.0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libhylafax4.2.0-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:10.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2006"); script_set_attribute(attribute:"cpe", value:"x-cpe:/o:mandrakesoft:mandrake_linux:le2005"); script_set_attribute(attribute:"patch_publication_date", value:"2006/01/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/01/22"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK10.1", reference:"hylafax-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", reference:"hylafax-client-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", reference:"hylafax-server-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64hylafax4.2.0-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", cpu:"x86_64", reference:"lib64hylafax4.2.0-devel-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libhylafax4.2.0-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.1", cpu:"i386", reference:"libhylafax4.2.0-devel-4.2.0-1.4.101mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", reference:"hylafax-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", reference:"hylafax-client-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", reference:"hylafax-server-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", cpu:"x86_64", reference:"lib64hylafax4.2.0-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", cpu:"x86_64", reference:"lib64hylafax4.2.0-devel-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", cpu:"i386", reference:"libhylafax4.2.0-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK10.2", cpu:"i386", reference:"libhylafax4.2.0-devel-4.2.0-3.2.102mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", reference:"hylafax-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", reference:"hylafax-client-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", reference:"hylafax-server-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", cpu:"x86_64", reference:"lib64hylafax4.2.0-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", cpu:"x86_64", reference:"lib64hylafax4.2.0-devel-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", cpu:"i386", reference:"libhylafax4.2.0-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK2006.0", cpu:"i386", reference:"libhylafax4.2.0-devel-4.2.1-2.2.20060mdk", yank:"mdk")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-933.NASL description Patrice Fournier found that hylafax passes unsanitized user data in the notify script, allowing users with the ability to submit jobs to run arbitrary commands with the privileges of the hylafax server. last seen 2020-06-01 modified 2020-06-02 plugin id 22799 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22799 title Debian DSA-933-1 : hylafax - arbitrary command execution code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-933. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(22799); script_version("1.15"); script_cvs_date("Date: 2019/08/02 13:32:20"); script_cve_id("CVE-2005-3539"); script_xref(name:"DSA", value:"933"); script_name(english:"Debian DSA-933-1 : hylafax - arbitrary command execution"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Patrice Fournier found that hylafax passes unsanitized user data in the notify script, allowing users with the ability to submit jobs to run arbitrary commands with the privileges of the hylafax server." ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2006/dsa-933" ); script_set_attribute( attribute:"solution", value: "Upgrade the hylafax package. For the old stable distribution (woody) this problem has been fixed in version 4.1.1-4woody1. For the stable distribution (sarge) this problem has been fixed in version 4.2.1-5sarge3." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:hylafax"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1"); script_set_attribute(attribute:"patch_publication_date", value:"2006/01/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/10/14"); script_set_attribute(attribute:"vuln_publication_date", value:"2006/01/04"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"3.0", prefix:"hylafax-client", reference:"4.1.1-4woody1")) flag++; if (deb_check(release:"3.0", prefix:"hylafax-doc", reference:"4.1.1-4woody1")) flag++; if (deb_check(release:"3.0", prefix:"hylafax-server", reference:"4.1.1-4woody1")) flag++; if (deb_check(release:"3.1", prefix:"hylafax-client", reference:"4.2.1-5sarge3")) flag++; if (deb_check(release:"3.1", prefix:"hylafax-doc", reference:"4.2.1-5sarge3")) flag++; if (deb_check(release:"3.1", prefix:"hylafax-server", reference:"4.2.1-5sarge3")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200601-03.NASL description The remote host is affected by the vulnerability described in GLSA-200601-03 (HylaFAX: Multiple vulnerabilities) Patrice Fournier discovered that HylaFAX runs the notify script on untrusted user input. Furthermore, users can log in without a password when HylaFAX is installed with the pam USE-flag disabled. Impact : An attacker could exploit the input validation vulnerability to run arbitrary code as the user running HylaFAX, which is usually uucp. The password vulnerability could be exploited to log in without proper user credentials. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 20413 published 2006-01-15 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/20413 title GLSA-200601-03 : HylaFAX: Multiple vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200601-03. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(20413); script_version("1.14"); script_cvs_date("Date: 2019/08/02 13:32:43"); script_cve_id("CVE-2005-3538", "CVE-2005-3539"); script_xref(name:"GLSA", value:"200601-03"); script_name(english:"GLSA-200601-03 : HylaFAX: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200601-03 (HylaFAX: Multiple vulnerabilities) Patrice Fournier discovered that HylaFAX runs the notify script on untrusted user input. Furthermore, users can log in without a password when HylaFAX is installed with the pam USE-flag disabled. Impact : An attacker could exploit the input validation vulnerability to run arbitrary code as the user running HylaFAX, which is usually uucp. The password vulnerability could be exploited to log in without proper user credentials. Workaround : There is no known workaround at this time." ); # http://www.hylafax.org/content/HylaFAX_4.2.4_release script_set_attribute( attribute:"see_also", value:"https://legacy.hylafax.org/content/HylaFAX_4.2.4_release" ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200601-03" ); script_set_attribute( attribute:"solution", value: "All HylaFAX users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/hylafax-4.2.3-r1'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:hylafax"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2006/01/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/01/15"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"net-misc/hylafax", unaffected:make_list("ge 4.2.3-r1"), vulnerable:make_list("lt 4.2.3-r1"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "HylaFAX"); }
References
- http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719
- http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719
- http://secunia.com/advisories/18314
- http://secunia.com/advisories/18314
- http://secunia.com/advisories/18337
- http://secunia.com/advisories/18337
- http://secunia.com/advisories/18366
- http://secunia.com/advisories/18366
- http://secunia.com/advisories/18489
- http://secunia.com/advisories/18489
- http://www.debian.org/security/2005/dsa-933
- http://www.debian.org/security/2005/dsa-933
- http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml
- http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml
- http://www.hylafax.org/content/HylaFAX_4.2.4_release
- http://www.hylafax.org/content/HylaFAX_4.2.4_release
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:015
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:015
- http://www.securityfocus.com/archive/1/420974/100/0/threaded
- http://www.securityfocus.com/archive/1/420974/100/0/threaded
- http://www.securityfocus.com/bid/16151
- http://www.securityfocus.com/bid/16151
- http://www.vupen.com/english/advisories/2006/0072
- http://www.vupen.com/english/advisories/2006/0072