ID

VAR-201510-0739


TITLE

HP Photosmart B210 SMB server Denial of Service Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2015-07215 // CNNVD: CNNVD-201510-704

DESCRIPTION

HP Printer provided by Photosmart B210 Let's manage the print queue SMB I am using a server. Crafted SMB Service disruption by packet (DoS) A condition can be triggered and a manual restart is required to recover. lead 296 byte Crafted SMB By sending a packet Photosmart B210 The service operation disruption (DoS) It is possible to make it into a state. A manual restart is required to recover. HP States: * "HP has examined this issue reported on the Photosmart B210 and has verified the printer could become unresponsive when fuzzed with the code provided. At no time did we identify buffer overflows with this tool nor our code inspection. The attempted attack produces a non-permanent denial of service. * HP's recommendation for existing models affected by this attack is to power cycle the device to return it to a working state. * HP continually works to improve security and is taking steps to ensure current and future products are not susceptible to this attack." * HP Is Photosmart B210 We have reviewed this issue reported for and confirmed that the printer becomes unresponsive during fuzzing using the provided code. However, neither this fuzzing tool nor our code inspection has confirmed the occurrence of buffer overflow. This attack causes non-persistent service disruption. For existing products affected by this attack, HP Recommends that you turn power back on to return the instrument to working condition. * HP Will continue to improve security and make current and future products less susceptible to this attack. The root cause of the crash is still unknown.Same as the product LAN The product is disrupted by the attacker (DoS) There is a possibility of being put into a state. To recover, the product must be restarted. The HP Photosmart B210 is a printer product from Hewlett-Packard (HP). A denial of service vulnerability exists in the HP Photosmart B210. Attackers can exploit this issue to cause denial-of-service condition

Trust: 2.79

sources: CERT/CC: VU#840844 // JVNDB: JVNDB-2015-006005 // CNVD: CNVD-2015-07215 // CNNVD: CNNVD-201510-704 // BID: 77290

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-07215

AFFECTED PRODUCTS

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp photosmart plus e-all-in-one printer seriesscope:eqversion:- b210

Trust: 0.8

vendor:hpmodel:photosmart b210scope: - version: -

Trust: 0.6

vendor:hpmodel:photosmart b210scope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#840844 // CNVD: CNVD-2015-07215 // BID: 77290 // JVNDB: JVNDB-2015-006005

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2015-006005
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-07215
value: MEDIUM

Trust: 0.6

IPA: JVNDB-2015-006005
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2015-07215
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2015-07215 // JVNDB: JVNDB-2015-006005

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201510-704

TYPE

Unknown

Trust: 0.3

sources: BID: 77290

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006005

EXTERNAL IDS

db:CERT/CCid:VU#840844

Trust: 1.9

db:BIDid:77290

Trust: 1.5

db:JVNid:JVNVU90756914

Trust: 0.8

db:JVNDBid:JVNDB-2015-006005

Trust: 0.8

db:CNVDid:CNVD-2015-07215

Trust: 0.6

db:CNNVDid:CNNVD-201510-704

Trust: 0.6

sources: CERT/CC: VU#840844 // CNVD: CNVD-2015-07215 // BID: 77290 // JVNDB: JVNDB-2015-006005 // CNNVD: CNNVD-201510-704

REFERENCES

url:http://www.securityfocus.com/bid/77290

Trust: 1.2

url:http://www.kb.cert.org/vuls/id/840844

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90756914/index.html

Trust: 0.8

url:http://www.rapid7.com/db/modules/auxiliary/fuzzers/smb/smb2_negotiate_corrupt

Trust: 0.8

url:http://www.hp.com/

Trust: 0.3

sources: CERT/CC: VU#840844 // CNVD: CNVD-2015-07215 // BID: 77290 // JVNDB: JVNDB-2015-006005 // CNNVD: CNNVD-201510-704

CREDITS

Avery Raaymakers

Trust: 0.9

sources: BID: 77290 // CNNVD: CNNVD-201510-704

SOURCES

db:CERT/CCid:VU#840844
db:CNVDid:CNVD-2015-07215
db:BIDid:77290
db:JVNDBid:JVNDB-2015-006005
db:CNNVDid:CNNVD-201510-704

LAST UPDATE DATE

2022-05-17T02:04:33.723000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#840844date:2015-10-21T00:00:00
db:CNVDid:CNVD-2015-07215date:2015-11-04T00:00:00
db:BIDid:77290date:2015-10-21T00:00:00
db:JVNDBid:JVNDB-2015-006005date:2015-11-24T00:00:00
db:CNNVDid:CNNVD-201510-704date:2015-10-29T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#840844date:2015-10-21T00:00:00
db:CNVDid:CNVD-2015-07215date:2015-11-04T00:00:00
db:BIDid:77290date:2015-10-21T00:00:00
db:JVNDBid:JVNDB-2015-006005date:2015-11-24T00:00:00
db:CNNVDid:CNNVD-201510-704date:2015-10-29T00:00:00