We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.
Reserved 2025-08-04 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
Craig Freyman
www.actfax.com/
web.archive.org/...om/2013/02/actfax-raw-server-exploit.html
raw.githubusercontent.com/...s/misc/actfax_raw_server_bof.rb
www.exploit-db.com/exploits/24467
www.vulncheck.com/...ories/actfax-raw-server-buffer-overflow
Support options