ID
VAR-201002-0311
TITLE
Xerox WorkCentre PJL Daemon Remote Overflow Vulnerability
Trust: 0.6
DESCRIPTION
Xerox WorkCentre is a digital print and copy machine. A buffer overflow vulnerability exists in Xerox WorkCentre's PJL daemon implementation. A remote attacker can cause a crash by sending a malicious request message to the service. The device must be hard restarted before it can resume operation. Xerox WorkCentre is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code with the privileges of the application or crash the affected application. Xerox WorkCentre 4150 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Xerox WorkCentre 4150 PJL Daemon Denial of Service SECUNIA ADVISORY ID: SA38411 VERIFY ADVISORY: http://secunia.com/advisories/38411/ DESCRIPTION: A vulnerability has been reported in Xerox WorkCentre 4150, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the PJL daemon and can be exploited to cause a crash via a specially crafted packet sent to TCP port 9100. SOLUTION: A patch is reportedly available. Please contact the vendor for more information. PROVIDED AND/OR DISCOVERED BY: Francis Provencher, Protek Research Lab's ORIGINAL ADVISORY: http://www.protekresearchlab.com/2010/01/prl-xerox-workcenter-4150-remote-buffer.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
Trust: 0.9
IOT TAXONOMY
category: | ['Network device'] | sub_category: | - | Trust: 0.6 |
AFFECTED PRODUCTS
vendor: | xerox | model: | workcentre | scope: | eq | version: | 4150 | Trust: 0.9 |
THREAT TYPE
network
Trust: 0.3
TYPE
Boundary Condition Error
Trust: 0.3
EXTERNAL IDS
db: | BID | id: | 38010 | Trust: 0.9 |
db: | SECUNIA | id: | 38411 | Trust: 0.7 |
db: | CNVD | id: | CNVD-2010-0190 | Trust: 0.6 |
db: | PACKETSTORM | id: | 85903 | Trust: 0.1 |
REFERENCES
url: | http://secunia.com/advisories/38411/ | Trust: 0.7 |
url: | http://www.office.xerox.com/multifunction-printer/multifunction-over-30ppm/workcentre-4150/enus.html | Trust: 0.3 |
url: | http://www.xerox.com | Trust: 0.3 |
url: | /archive/1/509275 | Trust: 0.3 |
url: | http://secunia.com/advisories/secunia_security_advisories/ | Trust: 0.1 |
url: | http://secunia.com/blog/71/ | Trust: 0.1 |
url: | http://www.protekresearchlab.com/2010/01/prl-xerox-workcenter-4150-remote-buffer.html | Trust: 0.1 |
url: | http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org | Trust: 0.1 |
url: | http://secunia.com/advisories/about_secunia_advisories/ | Trust: 0.1 |
CREDITS
Francis Provencher
Trust: 0.3
SOURCES
db: | CNVD | id: | CNVD-2010-0190 |
db: | BID | id: | 38010 |
db: | PACKETSTORM | id: | 85903 |
LAST UPDATE DATE
2022-05-17T01:38:39.560000+00:00
SOURCES UPDATE DATE
db: | CNVD | id: | CNVD-2010-0190 | date: | 2010-02-02T00:00:00 |
db: | BID | id: | 38010 | date: | 2010-02-01T17:31:00 |
SOURCES RELEASE DATE
db: | CNVD | id: | CNVD-2010-0190 | date: | 2010-02-02T00:00:00 |
db: | BID | id: | 38010 | date: | 2009-12-31T00:00:00 |
db: | PACKETSTORM | id: | 85903 | date: | 2010-02-03T10:02:56 |