ID

VAR-200608-0045


CVE

CVE-2006-2112


TITLE

FXPS In the print engine FTP Vulnerability using print interface as proxy

Trust: 0.8

sources: JVNDB: JVNDB-2006-001007

DESCRIPTION

Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, allows remote attackers to use the FTP printing interface as a proxy ("FTP bounce") by using arbitrary PORT arguments to connect to systems for which access would be otherwise restricted. This could result in the proxying of arbitrary requests by a user through the system using the vulnerable FTP print server. Successful exploits may allow an attacker to make connections to arbitrary hosts and generate traffic with the identity of the vulnerable FTP print server. As a result, this may allow the attacker to bypass access controls and security restrictions by masking the original source of the attacker's traffic. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Dell Color Laser Printers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21630 VERIFY ADVISORY: http://secunia.com/advisories/21630/ CRITICAL: Less critical IMPACT: Security Bypass, DoS WHERE: >From local network OPERATING SYSTEM: Dell Color Laser Printer 5110cn http://secunia.com/product/11721/ Dell Color Laser Printer 5100cn http://secunia.com/product/11733/ Dell Color Laser Printer 3110cn http://secunia.com/product/11734/ Dell Color Laser Printer 3100cn http://secunia.com/product/11736/ Dell Color Laser Printer 3010cn http://secunia.com/product/11735/ Dell Color Laser Printer 3000cn http://secunia.com/product/11737/ DESCRIPTION: Some vulnerabilities have been reported in various Dell Color Laser Printers, which can be exploited by malicious people to bypass certain security restrictions or to cause a DoS (Denial of Service). 1) The embedded FTP server does not restrict the use of the FTP PORT command. 2) The embedded HTTP server does not authenticate certain HTTP requests correctly. This can be exploited to make unauthorized changes to the system configuration or to cause a DoS. The vulnerability has been reported in Dell 5110cn, Dell 3110cn, and Dell 3010cn with firmware versions prior to A01 and in Dell 5100cn, Dell 3100cn, and Dell 3000cn with firmware versions prior to A05. NOTE: Other products using the Fuji Xerox Printing Engine may also be affected. SOLUTION: Apply patches. Dell 5110cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R130538.EXE Dell 3110cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R130356.EXE Dell 3010cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R132075.EXE Dell 5100cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132718.EXE Dell 3100cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132079.EXE Dell 3000cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132368.EXE PROVIDED AND/OR DISCOVERED BY: Nate Johnson and Sean Krulewitch, Indiana University. ORIGINAL ADVISORY: https://itso.iu.edu/20060824_FXPS_Print_Engine_Vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . PROVIDED AND/OR DISCOVERED BY: Nate Johnson and Sean Krulewitch, Indiana University. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Indiana University Security Advisory: Fuji Xerox Printing Systems (FXPS)[1] print engine vulnerabilities Advisory ID: 20060824_FXPS_Print_Engine_Vulnerabilities[2] Revisions: 08-24-2006 2350 UTC 1.0 Initial Public Release Issues: FTP bounce attack is possible when FTP printing is enabled (CVE-2006-2112)[3] Embedded HTTP server allows unauthenticated access to system configuration and settings (CVE-2006-2113)[4] Credit/acknowledgement: CVE-2006-2112 Date of discovery: 04-11-2006 Nate Johnson, Lead Security Engineer, Indiana University Sean Krulewitch, Deputy IT Security Officer, Indiana University CVE-2006-2113 Date of discovery: 04-11-2006 Sean Krulewitch, Deputy IT Security Officer, Indiana University Summary: Certain FXPS print engines contain vulnerabilities that allow a remote attacker to perform FTP bounce attacks through the FTP printing interface or allow unauthenticated access to the embedded HTTP remote user interface. A successful attacker would be able to reset the administrator password but would not be capable of exposing the current password. Mitigation/workarounds: Disabling FTP printing prevents the FTP bounce attack. Disabling the embedded web server prevents the DoS/unauthorized configuration change attack. Best practice suggests that access controls and network firewall policies be put into place to only allow connections from trusted machines and networks. Criticality: These vulnerabilities have a combined risk of moderately critical. Footnotes: [1] http://www.fxpsc.co.jp/en/ [2] https://itso.iu.edu/20060824_FXPS_Print_Engine_Vulnerabilities [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2112 [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2113 [5] http://ftp.us.dell.com/printer/R130538.EXE [6] http://ftp.us.dell.com/printer/R130356.EXE [7] http://ftp.us.dell.com/printer/R132075.EXE [8] http://ftp.us.dell.com/printer/R132718.EXE [9] http://ftp.us.dell.com/printer/R132079.EXE [10] http://ftp.us.dell.com/printer/R132368.EXE All contents are Copyright 2006 The Trustees of Indiana University. All rights reserved. - -- Sean Krulewitch, Deputy IT Security Officer IT Security Office, Office of the VP for Information Technology Indiana University For PGP Key or S/MIME cert: https://www.itso.iu.edu/Sean_Krulewitch -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.6 (Build 6060) iQA/AwUBRO46FTOEdAVfeKEbEQKc+ACeNvyfI5+GXspTdx32rSxH+WHfXW8AoKPe AJYb0WM59jddPs4cSXaZOyQq =Y7Kv -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2006-2112 // JVNDB: JVNDB-2006-001007 // BID: 19711 // VULHUB: VHN-18220 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473

AFFECTED PRODUCTS

vendor:dellmodel:3100cnscope: - version: -

Trust: 1.4

vendor:dellmodel:3110cnscope: - version: -

Trust: 1.4

vendor:dellmodel:5100cnscope: - version: -

Trust: 1.4

vendor:dellmodel:5110cnscope: - version: -

Trust: 1.4

vendor:fuji xeroxmodel:docuprint 181 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c1616scope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:phaser 6201jscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c2535ascope:eqversion:*

Trust: 1.0

vendor:dellmodel:5100cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 211scope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 181scope:eqversion:*

Trust: 1.0

vendor:dellmodel:3000cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c830scope:eqversion:*

Trust: 1.0

vendor:dellmodel:3100cnscope:eqversion:*

Trust: 1.0

vendor:dellmodel:5110cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 211 network option cardscope:eqversion:*

Trust: 1.0

vendor:dellmodel:3010cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:printing systems print enginescope:eqversion:*

Trust: 1.0

vendor:dellmodel:3110cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c1616 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c525a network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c830 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c525ascope:eqversion:*

Trust: 1.0

vendor:dellmodel:3000cnscope: - version: -

Trust: 0.8

vendor:dellmodel:3010cnscope: - version: -

Trust: 0.8

vendor:fuji xeroxmodel:docuprintscope:ltversion:firmware 20060628

Trust: 0.8

vendor:fuji xeroxmodel:docuprintscope:ltversion:and network option card firmware 5.13

Trust: 0.8

vendor:dellmodel:3110cn a01scope:neversion: -

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c2535ascope:eqversion:0

Trust: 0.3

vendor:dellmodel:5100cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3110cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3100cn a05scope:neversion: -

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprintscope:eqversion:1810

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525a network option cardscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3000cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:5110cn a01scope:neversion: -

Trust: 0.3

vendor:dellmodel:3000cn a05scope:neversion: -

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525ascope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprintscope:eqversion:2110

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:eqversion:1810

Trust: 0.3

vendor:dellmodel:3100cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:5100cn a05scope:neversion: -

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525a network option cardscope:neversion:8.17

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:neversion:2115.13

Trust: 0.3

vendor:dellmodel:3010cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:5110cnscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:eqversion:2110

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616scope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. fxps print enginescope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616 network option cardscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830 network option cardscope:neversion:5.13

Trust: 0.3

vendor:dellmodel:3010cn a01scope:neversion: -

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616 network option cardscope:neversion:5.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830 network option cardscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. phaser 6201jscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830scope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:neversion:1815.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. phaser 6201jscope:neversion:5.13

Trust: 0.3

sources: BID: 19711 // JVNDB: JVNDB-2006-001007 // CNNVD: CNNVD-200608-407 // NVD: CVE-2006-2112

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2112
value: HIGH

Trust: 1.0

NVD: CVE-2006-2112
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200608-407
value: HIGH

Trust: 0.6

VULHUB: VHN-18220
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2112
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-18220
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18220 // JVNDB: JVNDB-2006-001007 // CNNVD: CNNVD-200608-407 // NVD: CVE-2006-2112

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-18220 // JVNDB: JVNDB-2006-001007 // NVD: CVE-2006-2112

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200608-407

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200608-407

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001007

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-18220

PATCH

title:Top Pageurl:http://www.dell.com/

Trust: 0.8

title:Top Pageurl:http://www.fxpsc.co.jp/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001007

EXTERNAL IDS

db:NVDid:CVE-2006-2112

Trust: 2.9

db:BIDid:19711

Trust: 2.0

db:SECUNIAid:22463

Trust: 1.8

db:SECUNIAid:21630

Trust: 1.8

db:VUPENid:ADV-2006-3401

Trust: 1.7

db:OSVDBid:28249

Trust: 1.7

db:JVNDBid:JVNDB-2006-001007

Trust: 0.8

db:CNNVDid:CNNVD-200608-407

Trust: 0.7

db:BUGTRAQid:20060825 INDIANA UNIVERSITY SECURITY ADVISORY: FUJI XEROX PRINTING SYSTEMS (FXPS) PRINT ENGINE VULNERABILITIE

Trust: 0.6

db:BUGTRAQid:20060825 INDIANA UNIVERSITY SECURITY ADVISORY: FUJI XEROX PRINTING SYSTEMS (FXPS) PRINT ENGINE VULNERABILITIES

Trust: 0.6

db:XFid:28637

Trust: 0.6

db:PACKETSTORMid:49473

Trust: 0.2

db:VULHUBid:VHN-18220

Trust: 0.1

db:PACKETSTORMid:49519

Trust: 0.1

db:PACKETSTORMid:50964

Trust: 0.1

sources: VULHUB: VHN-18220 // BID: 19711 // JVNDB: JVNDB-2006-001007 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473 // CNNVD: CNNVD-200608-407 // NVD: CVE-2006-2112

REFERENCES

url:http://itso.iu.edu/20060824_fxps_print_engine_vulnerabilities

Trust: 2.3

url:http://www.securityfocus.com/bid/19711

Trust: 1.7

url:http://www.osvdb.org/28249

Trust: 1.7

url:http://secunia.com/advisories/21630

Trust: 1.7

url:http://secunia.com/advisories/22463

Trust: 1.7

url:http://www.securityfocus.com/archive/1/444321/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3401

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28637

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=115652437223454&w=2

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2112

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2112

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28637

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/444321/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3401

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=115652437223454&w=2

Trust: 0.6

url:http://www.fxpsc.co.jp/en/

Trust: 0.4

url:http://dell.com

Trust: 0.3

url:/archive/1/444321

Trust: 0.3

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132718.exe

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/21630/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r130356.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132079.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132368.exe

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r130538.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132075.exe

Trust: 0.2

url:http://marc.info/?l=bugtraq&m=115652437223454&w=2

Trust: 0.1

url:http://secunia.com/product/11736/

Trust: 0.1

url:http://secunia.com/product/11721/

Trust: 0.1

url:http://secunia.com/product/11734/

Trust: 0.1

url:http://secunia.com/product/11737/

Trust: 0.1

url:http://secunia.com/product/11735/

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://secunia.com/product/11733/

Trust: 0.1

url:http://secunia.com/advisories/22463/

Trust: 0.1

url:http://secunia.com/product/12311/

Trust: 0.1

url:http://secunia.com/product/12314/

Trust: 0.1

url:http://secunia.com/product/12310/

Trust: 0.1

url:http://secunia.com/product/12313/

Trust: 0.1

url:http://secunia.com/product/12315/

Trust: 0.1

url:http://secunia.com/product/12312/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2112

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2113

Trust: 0.1

url:https://www.itso.iu.edu/sean_krulewitch

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2113

Trust: 0.1

sources: VULHUB: VHN-18220 // BID: 19711 // JVNDB: JVNDB-2006-001007 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473 // CNNVD: CNNVD-200608-407 // NVD: CVE-2006-2112

CREDITS

Nate Johnson and Sean Krulewitch are credited with discovering this vulnerability.

Trust: 0.9

sources: BID: 19711 // CNNVD: CNNVD-200608-407

SOURCES

db:VULHUBid:VHN-18220
db:BIDid:19711
db:JVNDBid:JVNDB-2006-001007
db:PACKETSTORMid:49519
db:PACKETSTORMid:50964
db:PACKETSTORMid:49473
db:CNNVDid:CNNVD-200608-407
db:NVDid:CVE-2006-2112

LAST UPDATE DATE

2024-08-14T14:08:27.446000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18220date:2018-10-18T00:00:00
db:BIDid:19711date:2006-10-13T21:49:00
db:JVNDBid:JVNDB-2006-001007date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200608-407date:2006-10-30T00:00:00
db:NVDid:CVE-2006-2112date:2018-10-18T16:38:14.397

SOURCES RELEASE DATE

db:VULHUBid:VHN-18220date:2006-08-25T00:00:00
db:BIDid:19711date:2006-08-25T00:00:00
db:JVNDBid:JVNDB-2006-001007date:2012-06-26T00:00:00
db:PACKETSTORMid:49519date:2006-08-29T03:00:37
db:PACKETSTORMid:50964date:2006-10-16T15:32:01
db:PACKETSTORMid:49473date:2006-08-28T05:06:00
db:CNNVDid:CNNVD-200608-407date:2006-08-24T00:00:00
db:NVDid:CVE-2006-2112date:2006-08-25T01:04:00