|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Misc. >> Xerox DocuCentre / WorkCentre Postscript Directory Traversal Vulnerability Vulnerability Assessment Details
|
Xerox DocuCentre / WorkCentre Postscript Directory Traversal Vulnerability |
||
Checks model number / software version of Xerox DocuCentre and WorkCentre devices Detailed Explanation for this Vulnerability Assessment Summary : The remote web server is prone to a directory traversal attack. Description : According to its model number and software versions, the remote host is a Xerox Document Centre or WorkCentre device in which the PostScript interpreter may permit unauthorized access to the underlying directory structure. Using a specially crafted PostScript file, an attacker can exploit this flaw and gain access to sensitive files on the affected device, including its encrypted password file. See also : http://www.xerox.com/downloads/usa/en/c/CERT_Xerox_Security_XRX05_001.pdf http://www.xerox.com/downloads/usa/en/c/CERT_Xerox_Security_XRX04-10.pdf http://www.xerox.com/downloads/usa/en/c/CERT_Xerox_Security_XRX04-05.pdf http://www.xerox.com/downloads/usa/en/c/CERT_Xerox_Security_XRX04-03.pdf Solution : Apply the appropriate patches as described in the Xerox security bulletins. Network Security Threat Level: Low / CVSS Base Score : 3 (AV:R/AC:L/Au:NR/C:C/A:N/I:N/B:N) Networks Security ID: 12335 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |