Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by one or more stack-based buffer overflow vulnerabilities in the Google Cloud Print implementation that would allow an unauthenticated attacker to execute arbitrary code on the device. This was caused by an insecure handling of the register parameters, because the size used within a memcpy() function, which copied the action value into a local variable, was not checked properly.
References
Link | Resource |
---|---|
https://security.business.xerox.com/ | Vendor Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/ | Third Party Advisory |
https://security.business.xerox.com/ | Vendor Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.business.xerox.com/ - Vendor Advisory | |
References | () https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-xerox-printers/ - Third Party Advisory |
Information
Published : 2020-03-13 19:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13171
Mitre link : CVE-2019-13171
CVE.ORG link : CVE-2019-13171
JSON object : View
Products Affected
xerox
- phaser_3320
- phaser_3320_firmware
CWE
CWE-787
Out-of-bounds Write