'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:714834)

Rule General Information
Release Date: 2025-07-30
Rule Name: ActFax LPD Server Buffer Overflow Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: Actfax is a network fax server software that is compatible with Windows and Unix systems. It has a buffer overflow vulnerability in Actfax LPD servers 5.01 and earlier. This vulnerability is caused by insufficient boundary checking when processing certain fields. By sending carefully crafted messages to the target server, unauthorized remote attackers can exploit this vulnerability to execute arbitrary code with the privileges of vulnerable servers. If the code execution is unsuccessful, the service may terminate abnormally.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.