Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> Xerox XRX06-005


Vulnerability Assessment Details

Xerox XRX06-005

Vulnerability Assessment Summary
Checks Net Controller Software version of Xerox WorkCentre devices

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote multi-function device is prone to a code injection
vulnerability.

Description :

According to its model number and software versions, the remote host
is a Xerox WorkCentre device that reportedly is prone to a code
injection issue, which could permit execution of arbitrary code on the
remote host.

See also :

http://www.xerox.com/downloads/usa/en/c/cert_XRX06_005.pdf

Solution :

Apply the P29 patch as described in the Xerox security bulletins.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 20334

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Cisco Catalyst WS-4507R-E Switch Chassis w/ 3 Modules + Fans + 1 PSU
$1.0
Cisco Catalyst WS-4507R-E Switch Chassis w/ 3 Modules + Fans + 1 PSU pictureHP ProCurve Switch LOT 2620-48, 2626-24 Managed Ethernet Switch (LOT of 2)
$75.0
HP ProCurve Switch LOT 2620-48, 2626-24 Managed Ethernet Switch (LOT of 2) pictureTP-Link POE200 PoE Adapter Kit Power over Gigabit Network Ethernet Splitter
$4.0
TP-Link POE200 PoE Adapter Kit Power over Gigabit Network Ethernet Splitter pictureSRW2024 cisco 24 Port 10/100/1000 Gigabit Switch
$30.0
SRW2024 cisco 24 Port 10/100/1000 Gigabit Switch picture


Discussions

No Discussions have been posted on this vulnerability.