Vulnerability CVE-2013-6032


Published: 2014-02-04

Description:
cgi-bin/postpf/cgi-bin/dynamic/config/config.html on Lexmark X94x before LC.BR.P142, X85x through LC4.BE.P487, X644 and X646 before LC2.MC.P374, X642 through LC2.MB.P318, W840 through LS.HA.P252, T64x before LS.ST.P344, X64xef through LC2.TI.P325, C935dn through LC.JO.P091, C920 through LS.TA.P152, C78x through LC.IO.P187, X78x through LC2.IO.P335, C77x through LC.CM.P052, X772 through LC2.TR.P291, C53x through LS.SW.P069, C52x through LS.FA.P150, 25xxN through LCL.CU.P114, N4000 through LC.MD.P119, N4050e through GO.GO.N206, N70xxe through LC.CO.N309, E450 through LM.SZ.P124, E350 through LE.PH.P129, and E250 through LE.PM.P126 printers allows remote attackers to remove the Password Protect administrative password via the vac.255.GENPASSWORD parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
Lexmark config.html remote remove admin password
USCERT
06.02.2014

Type:

CWE-20

(Improper Input Validation)

Vendor: Lexmark
Product: C920 
Version: ls.ta.p152;
Product: C53X 
Version: ls.sw.p069;
Product: T64X 
Version: ls.st.p343;
Product: W840 
Version: ls.ha.p252;
Product: C52X 
Version: ls.fa.p150;
Product: E450 
Version: lm.sz.p124;
Product: E250 
Version: le.pm.p126;
Product: E350 
Version: le.ph.p129;
Product: 25xxn 
Version: lcl.cu.p114;
Product: X85X 
Version: lc4.be.p487;
Product: X644 
Version: lc4.be.p487;
Product: X772 
Version: lc2.tr.p291;
Product: X64xef 
Version: lc2.ti.p325;
Product: X646 
Version: lc2.mc.p373;
Product: X642 
Version: lc2.mb.p318;
Product: X78X 
Version: lc2.io.p335;
Product: N4000 
Version: lc.md.p119;
Product: C935dn 
Version: lc.jo.p091;
Product: C78X 
Version: lc.io.p187;
Product: N70xxe 
Version: lc.co.n309;
Product: C77X 
Version: lc.cm.p052;
Product: X94X 
Version: lc.br.p141;
Product: N4050e 
Version: go.go.n206;

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://www.kb.cert.org/vuls/id/108062
http://support.lexmark.com/index?page=content&id=TE586

Related CVE
CVE-2018-17944
On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server's hostname to one that they control, and then capturing the credentials that are sent the...
CVE-2019-6489
Certain Lexmark CX, MX, X, XC, XM, XS, and 6500e devices before 2019-02-11 allow remote attackers to erase stored shortcuts.
CVE-2017-13771
Lexmark Scan To Network (SNF) 3.2.9 and earlier stores network configuration credentials in plaintext and transmits them in requests, which allows remote attackers to obtain sensitive information via requests to (1) cgi-bin/direct/printer/prtappauth/...
CVE-2017-2821
An exploitable use-after-free exists in the PDF parsing functionality of Lexmark Perspective Document Filters 11.3.0.2400 and 11.4.0.2452. A crafted PDF document can lead to a use-after-free resulting in direct code execution.
CVE-2017-2822
An exploitable code execution vulnerability exists in the image rendering functionality of Lexmark Perceptive Document Filters 11.3.0.2400. A specifically crafted PDF can cause a function call on a corrupted DCTStream to occur, resulting in user cont...
CVE-2017-2806
An exploitable arbitrary read exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a arbitrary read resulting in memory disclosure. The vulnerability was confirmed on versi...
CVE-2016-5646
An exploitable heap overflow vulnerability exists in the Compound Binary File Format (CBFF) parser functionality of Lexmark Perceptive Document Filters library. A specially crafted CBFF file can cause a code execution. An attacker can send a malforme...
CVE-2016-4335
An exploitable buffer overflow exists in the XLS parsing of the Lexmark Perspective Document Filters conversion functionality. A crafted XLS document can lead to a stack based buffer overflow resulting in remote code execution.

Copyright 2019, cxsecurity.com

 

Back to Top