Rapid7 VulnDB

ActFax 5.01 RAW Server Buffer Overflow

Back to Search

ActFax 5.01 RAW Server Buffer Overflow

Disclosed
02/05/2013
Created
05/30/2018

Description

This module exploits a vulnerability in ActFax Server 5.01 RAW server. The RAW Server can be used to transfer fax messages without any underlying protocols. To note significant fields in the fax being transferred, like the fax number or the recipient, ActFax data fields can be used. This module exploits a buffer overflow in the handling of the @F506 fields due to the insecure usage of strcpy. This module has been tested successfully on ActFax 5.01 over Windows XP SP3 (English).

Author(s)

  • Craig Freyman
  • corelanc0d3r
  • juan vazquez <juan.vazquez@metasploit.com>

Platform

Windows

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/misc/actfax_raw_server_bof
msf exploit(actfax_raw_server_bof) > show targets
    ...targets...
msf exploit(actfax_raw_server_bof) > set TARGET < target-id >
msf exploit(actfax_raw_server_bof) > show options
    ...show and set options...
msf exploit(actfax_raw_server_bof) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;