ID

VAR-200608-0046


CVE

CVE-2006-2113


TITLE

Fuji Xerox Printing Systems Embedded HTTP Server Multiple Vulnerabilities

Trust: 0.9

sources: BID: 19716 // CNNVD: CNNVD-200608-400

DESCRIPTION

The embedded HTTP server in Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, does not properly perform authentication for HTTP requests, which allows remote attackers to modify system configuration via crafted requests, including changing the administrator password or causing a denial of service to the print server. These issues occur because the application fails to properly validate HTTP requests. An attacker can exploit these issues to bypass authentication and gain administrative access to the affected embedded application or to cause denial-of-service conditions. This may lead to other attacks. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Dell Color Laser Printers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21630 VERIFY ADVISORY: http://secunia.com/advisories/21630/ CRITICAL: Less critical IMPACT: Security Bypass, DoS WHERE: >From local network OPERATING SYSTEM: Dell Color Laser Printer 5110cn http://secunia.com/product/11721/ Dell Color Laser Printer 5100cn http://secunia.com/product/11733/ Dell Color Laser Printer 3110cn http://secunia.com/product/11734/ Dell Color Laser Printer 3100cn http://secunia.com/product/11736/ Dell Color Laser Printer 3010cn http://secunia.com/product/11735/ Dell Color Laser Printer 3000cn http://secunia.com/product/11737/ DESCRIPTION: Some vulnerabilities have been reported in various Dell Color Laser Printers, which can be exploited by malicious people to bypass certain security restrictions or to cause a DoS (Denial of Service). 1) The embedded FTP server does not restrict the use of the FTP PORT command. This can be exploited to connect to arbitrary systems through the FTP server. This can be exploited to make unauthorized changes to the system configuration or to cause a DoS. The vulnerability has been reported in Dell 5110cn, Dell 3110cn, and Dell 3010cn with firmware versions prior to A01 and in Dell 5100cn, Dell 3100cn, and Dell 3000cn with firmware versions prior to A05. NOTE: Other products using the Fuji Xerox Printing Engine may also be affected. SOLUTION: Apply patches. Dell 5110cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R130538.EXE Dell 3110cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R130356.EXE Dell 3010cn (firmware versions prior to A01): http://ftp.us.dell.com/printer/R132075.EXE Dell 5100cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132718.EXE Dell 3100cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132079.EXE Dell 3000cn (firmware versions prior to A05): http://ftp.us.dell.com/printer/R132368.EXE PROVIDED AND/OR DISCOVERED BY: Nate Johnson and Sean Krulewitch, Indiana University. ORIGINAL ADVISORY: https://itso.iu.edu/20060824_FXPS_Print_Engine_Vulnerabilities ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . PROVIDED AND/OR DISCOVERED BY: Nate Johnson and Sean Krulewitch, Indiana University. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Indiana University Security Advisory: Fuji Xerox Printing Systems (FXPS)[1] print engine vulnerabilities Advisory ID: 20060824_FXPS_Print_Engine_Vulnerabilities[2] Revisions: 08-24-2006 2350 UTC 1.0 Initial Public Release Issues: FTP bounce attack is possible when FTP printing is enabled (CVE-2006-2112)[3] Embedded HTTP server allows unauthenticated access to system configuration and settings (CVE-2006-2113)[4] Credit/acknowledgement: CVE-2006-2112 Date of discovery: 04-11-2006 Nate Johnson, Lead Security Engineer, Indiana University Sean Krulewitch, Deputy IT Security Officer, Indiana University CVE-2006-2113 Date of discovery: 04-11-2006 Sean Krulewitch, Deputy IT Security Officer, Indiana University Summary: Certain FXPS print engines contain vulnerabilities that allow a remote attacker to perform FTP bounce attacks through the FTP printing interface or allow unauthenticated access to the embedded HTTP remote user interface. This allows an attacker to cause the FTP server to make arbitrary connections to ports on another system, which can be used to bypass access controls and hide the the true identity of the source of the attacker's traffic. A successful attacker would be able to reset the administrator password but would not be capable of exposing the current password. Mitigation/workarounds: Disabling FTP printing prevents the FTP bounce attack. Disabling the embedded web server prevents the DoS/unauthorized configuration change attack. Best practice suggests that access controls and network firewall policies be put into place to only allow connections from trusted machines and networks. Criticality: These vulnerabilities have a combined risk of moderately critical. Footnotes: [1] http://www.fxpsc.co.jp/en/ [2] https://itso.iu.edu/20060824_FXPS_Print_Engine_Vulnerabilities [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2112 [4] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2113 [5] http://ftp.us.dell.com/printer/R130538.EXE [6] http://ftp.us.dell.com/printer/R130356.EXE [7] http://ftp.us.dell.com/printer/R132075.EXE [8] http://ftp.us.dell.com/printer/R132718.EXE [9] http://ftp.us.dell.com/printer/R132079.EXE [10] http://ftp.us.dell.com/printer/R132368.EXE All contents are Copyright 2006 The Trustees of Indiana University. All rights reserved. - -- Sean Krulewitch, Deputy IT Security Officer IT Security Office, Office of the VP for Information Technology Indiana University For PGP Key or S/MIME cert: https://www.itso.iu.edu/Sean_Krulewitch -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.6 (Build 6060) iQA/AwUBRO46FTOEdAVfeKEbEQKc+ACeNvyfI5+GXspTdx32rSxH+WHfXW8AoKPe AJYb0WM59jddPs4cSXaZOyQq =Y7Kv -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2006-2113 // JVNDB: JVNDB-2006-001008 // BID: 19716 // VULHUB: VHN-18221 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473

AFFECTED PRODUCTS

vendor:dellmodel:3010cnscope: - version: -

Trust: 1.4

vendor:dellmodel:3100cnscope: - version: -

Trust: 1.4

vendor:dellmodel:3110cnscope: - version: -

Trust: 1.4

vendor:dellmodel:5100cnscope: - version: -

Trust: 1.4

vendor:dellmodel:5110cnscope: - version: -

Trust: 1.4

vendor:fuji xeroxmodel:docuprint 181 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c1616scope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:phaser 6201jscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c2535ascope:eqversion:*

Trust: 1.0

vendor:dellmodel:5100cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 211scope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 181scope:eqversion:*

Trust: 1.0

vendor:dellmodel:3000cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c830scope:eqversion:*

Trust: 1.0

vendor:dellmodel:3100cnscope:eqversion:*

Trust: 1.0

vendor:dellmodel:5110cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint 211 network option cardscope:eqversion:*

Trust: 1.0

vendor:dellmodel:3010cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:printing systems print enginescope:eqversion:*

Trust: 1.0

vendor:dellmodel:3110cnscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c1616 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c525a network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c830 network option cardscope:eqversion:*

Trust: 1.0

vendor:fuji xeroxmodel:docuprint c525ascope:eqversion:*

Trust: 1.0

vendor:dellmodel:3000cnscope: - version: -

Trust: 0.8

vendor:fuji xeroxmodel:docuprintscope:ltversion:firmware 20060628

Trust: 0.8

vendor:fuji xeroxmodel:docuprintscope:ltversion:and network option card firmware 5.13

Trust: 0.8

vendor:fujimodel:xerox printing systems co. phaser 6201jscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. fxps print enginescope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830 network option cardscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830scope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525a network option cardscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525ascope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c2535ascope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616 network option cardscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616scope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:eqversion:2110

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprintscope:eqversion:2110

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:eqversion:1810

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprintscope:eqversion:1810

Trust: 0.3

vendor:dellmodel:5110cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:5100cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3110cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3100cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3010cnscope:eqversion:0

Trust: 0.3

vendor:dellmodel:3000cnscope:eqversion:0

Trust: 0.3

vendor:fujimodel:xerox printing systems co. phaser 6201jscope:neversion:5.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c830 network option cardscope:neversion:5.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c525a network option cardscope:neversion:8.17

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint c1616 network option cardscope:neversion:5.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:neversion:2115.13

Trust: 0.3

vendor:fujimodel:xerox printing systems co. docuprint network option cardscope:neversion:1815.13

Trust: 0.3

vendor:dellmodel:5110cn a01scope:neversion: -

Trust: 0.3

vendor:dellmodel:5100cn a05scope:neversion: -

Trust: 0.3

vendor:dellmodel:3110cn a01scope:neversion: -

Trust: 0.3

vendor:dellmodel:3100cn a05scope:neversion: -

Trust: 0.3

vendor:dellmodel:3010cn a01scope:neversion: -

Trust: 0.3

vendor:dellmodel:3000cn a05scope:neversion: -

Trust: 0.3

sources: BID: 19716 // JVNDB: JVNDB-2006-001008 // CNNVD: CNNVD-200608-400 // NVD: CVE-2006-2113

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2113
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-2113
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200608-400
value: MEDIUM

Trust: 0.6

VULHUB: VHN-18221
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-2113
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-18221
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18221 // JVNDB: JVNDB-2006-001008 // CNNVD: CNNVD-200608-400 // NVD: CVE-2006-2113

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-18221 // JVNDB: JVNDB-2006-001008 // NVD: CVE-2006-2113

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200608-400

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-200608-400

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001008

PATCH

title:Top Pageurl:http://www.dell.com/

Trust: 0.8

title:Top Pageurl:http://www.fxpsc.co.jp/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001008

EXTERNAL IDS

db:NVDid:CVE-2006-2113

Trust: 2.9

db:BIDid:19716

Trust: 2.0

db:SECUNIAid:22463

Trust: 1.8

db:SECUNIAid:21630

Trust: 1.8

db:VUPENid:ADV-2006-3401

Trust: 1.7

db:OSVDBid:28250

Trust: 1.7

db:JVNDBid:JVNDB-2006-001008

Trust: 0.8

db:CNNVDid:CNNVD-200608-400

Trust: 0.7

db:BUGTRAQid:20060825 INDIANA UNIVERSITY SECURITY ADVISORY: FUJI XEROX PRINTING SYSTEMS (FXPS) PRINT ENGINE VULNERABILITIE

Trust: 0.6

db:BUGTRAQid:20060825 INDIANA UNIVERSITY SECURITY ADVISORY: FUJI XEROX PRINTING SYSTEMS (FXPS) PRINT ENGINE VULNERABILITIES

Trust: 0.6

db:VULHUBid:VHN-18221

Trust: 0.1

db:PACKETSTORMid:49519

Trust: 0.1

db:PACKETSTORMid:50964

Trust: 0.1

db:PACKETSTORMid:49473

Trust: 0.1

sources: VULHUB: VHN-18221 // BID: 19716 // JVNDB: JVNDB-2006-001008 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473 // CNNVD: CNNVD-200608-400 // NVD: CVE-2006-2113

REFERENCES

url:http://itso.iu.edu/20060824_fxps_print_engine_vulnerabilities

Trust: 2.3

url:http://www.securityfocus.com/bid/19716

Trust: 1.7

url:http://www.osvdb.org/28250

Trust: 1.7

url:http://secunia.com/advisories/21630

Trust: 1.7

url:http://secunia.com/advisories/22463

Trust: 1.7

url:http://www.securityfocus.com/archive/1/444321/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3401

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=115652437223454&w=2

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2113

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2113

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/444321/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3401

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=115652437223454&w=2

Trust: 0.6

url:http://www.fxpsc.co.jp/en/

Trust: 0.4

url:http://dell.com

Trust: 0.3

url:/archive/1/444321

Trust: 0.3

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132718.exe

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/21630/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r130356.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132079.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132368.exe

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://ftp.us.dell.com/printer/r130538.exe

Trust: 0.2

url:http://ftp.us.dell.com/printer/r132075.exe

Trust: 0.2

url:http://marc.info/?l=bugtraq&m=115652437223454&w=2

Trust: 0.1

url:http://secunia.com/product/11736/

Trust: 0.1

url:http://secunia.com/product/11721/

Trust: 0.1

url:http://secunia.com/product/11734/

Trust: 0.1

url:http://secunia.com/product/11737/

Trust: 0.1

url:http://secunia.com/product/11735/

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://secunia.com/product/11733/

Trust: 0.1

url:http://secunia.com/advisories/22463/

Trust: 0.1

url:http://secunia.com/product/12311/

Trust: 0.1

url:http://secunia.com/product/12314/

Trust: 0.1

url:http://secunia.com/product/12310/

Trust: 0.1

url:http://secunia.com/product/12313/

Trust: 0.1

url:http://secunia.com/product/12315/

Trust: 0.1

url:http://secunia.com/product/12312/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2112

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2112

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2113

Trust: 0.1

url:https://www.itso.iu.edu/sean_krulewitch

Trust: 0.1

sources: VULHUB: VHN-18221 // BID: 19716 // JVNDB: JVNDB-2006-001008 // PACKETSTORM: 49519 // PACKETSTORM: 50964 // PACKETSTORM: 49473 // CNNVD: CNNVD-200608-400 // NVD: CVE-2006-2113

CREDITS

Sean Krulewitch is credited with the discovery of these vulnerabilities.

Trust: 0.9

sources: BID: 19716 // CNNVD: CNNVD-200608-400

SOURCES

db:VULHUBid:VHN-18221
db:BIDid:19716
db:JVNDBid:JVNDB-2006-001008
db:PACKETSTORMid:49519
db:PACKETSTORMid:50964
db:PACKETSTORMid:49473
db:CNNVDid:CNNVD-200608-400
db:NVDid:CVE-2006-2113

LAST UPDATE DATE

2024-08-14T14:08:27.400000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18221date:2018-10-18T00:00:00
db:BIDid:19716date:2006-10-13T21:49:00
db:JVNDBid:JVNDB-2006-001008date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200608-400date:2006-10-30T00:00:00
db:NVDid:CVE-2006-2113date:2018-10-18T16:38:15.100

SOURCES RELEASE DATE

db:VULHUBid:VHN-18221date:2006-08-25T00:00:00
db:BIDid:19716date:2006-08-25T00:00:00
db:JVNDBid:JVNDB-2006-001008date:2012-06-26T00:00:00
db:PACKETSTORMid:49519date:2006-08-29T03:00:37
db:PACKETSTORMid:50964date:2006-10-16T15:32:01
db:PACKETSTORMid:49473date:2006-08-28T05:06:00
db:CNNVDid:CNNVD-200608-400date:2006-08-24T00:00:00
db:NVDid:CVE-2006-2113date:2006-08-25T01:04:00