The FTP print feature in multiple Canon printers, including imageRUNNER and imagePRESS, allow remote attackers to use the server as an inadvertent proxy via a modified PORT command, aka FTP bounce.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://itso.iu.edu/20080229_Canon_MFD_FTP_bounce_attack - | |
References | () http://jvn.jp/en/jp/JVN10056705/index.html - | |
References | () http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000013.html - | |
References | () http://securitytracker.com/id?1019528 - | |
References | () http://www.kb.cert.org/vuls/id/568073 - US Government Resource | |
References | () http://www.securityfocus.com/bid/28042 - | |
References | () http://www.usa.canon.com/html/security/pdf/CVA-001.pdf - |
Information
Published : 2008-02-29 02:44
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0303
Mitre link : CVE-2008-0303
CVE.ORG link : CVE-2008-0303
JSON object : View
Products Affected
canon
- i-sensys
- imagerunner_c3220
- imagerunner_5020
- imagerunner_8500
- imagepress
- imagerunner_2620
- imagerunner_6870
- imagerunner_c6800
- imagerunner
- imagerunner_c3200
- imagerunner_9070
- imagerunner_5000i
CWE