A stack-based buffer overflow vulnerability exists in ActFax Server version 4.32, specifically in the "Import Users from File" functionality of the client interface. The application fails to properly validate the length of tab-delimited fields in .exp files, leading to unsafe usage of strcpy() during CSV parsing. An attacker can exploit this vulnerability by crafting a malicious .exp file and importing it using the default character set "ECMA-94 / Latin 1 (ISO 8859)". Successful exploitation may result in arbitrary code execution, leading to full system compromise. User interaction is required to trigger the vulnerability.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Actfax Actfax actfax | |
| Vendors & Products | Actfax Actfax actfax | 
Fri, 08 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 08 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in ActFax Server version 4.32, specifically in the "Import Users from File" functionality of the client interface. The application fails to properly validate the length of tab-delimited fields in .exp files, leading to unsafe usage of strcpy() during CSV parsing. An attacker can exploit this vulnerability by crafting a malicious .exp file and importing it using the default character set "ECMA-94 / Latin 1 (ISO 8859)". Successful exploitation may result in arbitrary code execution, leading to full system compromise. User interaction is required to trigger the vulnerability. | |
| Title | ActFax 4.32 Client Importer Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |  | 
 | 
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-08T18:09:17.239Z
Updated: 2025-08-08T19:02:10.295Z
Reserved: 2025-08-07T20:10:46.016Z
Link: CVE-2012-10043
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-08T19:01:59.779Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-08T19:15:34.150
Modified: 2025-08-08T20:30:18.180
Link: CVE-2012-10043
 Redhat
                        Redhat
                    No data.