{"id":"CVE-2004-1182","details":"hfaxd in HylaFAX before 4.2.1, when installed with a \"weak\" hosts.hfaxd file, allows remote attackers to authenticate and bypass intended access restrictions via a crafted (1) username or (2) hostname that satisfies a regular expression that is matched against a hosts.hfaxd entry without a password.","modified":"2026-04-10T03:36:32.465331Z","published":"2004-12-31T05:00:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/13812"},{"type":"ADVISORY","url":"http://www.debian.org/security/2004/dsa-634"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:006"},{"type":"FIX","url":"http://security.gentoo.org/glsa/glsa-200501-21.xml"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=110546971307585&w=2"},{"type":"WEB","url":"http://marc.info/?l=hylafax&m=110545119911558&w=2"}],"schema_version":"1.7.5"}