Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2019-14300 CVE-2019-14305 CVE-2019-14307 CVE-2019-14308 |
CWE-ID | CWE-119 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
SP C252DN Hardware solutions / Firmware SP C250DN Hardware solutions / Firmware SP C252SF Hardware solutions / Firmware SP C250SF Hardware solutions / Firmware |
Vendor | RICOH COMPANY, LTD. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU21113
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-14300
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing HTTP cookie headers. A remote attacker can send a specially crafted requests to the web server, trigger memory corruption and cause a denial of service condition or execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSP C252DN: 1.04 - 1.06
SP C250DN: 1.04 - 1.06
SP C252SF: 1.08 - 1.12
SP C250SF: 1.08 - 1.12
External linkshttp://jvn.jp/en/jp/JVN11708203/index.html
http://www.ricoh.com/info/2019/0823_1/
http://www.ricoh-usa.com/en/support-and-download
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU21114
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-14305
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts. A remote authenticated attacker can send a specially crafted requests to the web server, trigger memory corruption and cause a denial of service condition or execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSP C252DN: 1.04 - 1.06
SP C250DN: 1.04 - 1.06
SP C252SF: 1.08 - 1.12
SP C250SF: 1.08 - 1.12
External linkshttp://jvn.jp/en/jp/JVN11708203/index.html
http://www.ricoh.com/info/2019/0823_1/
http://www.ricoh-usa.com/en/support-and-download
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU21115
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-14307
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing HTTP parameter settings for SNMP. A remote authenticated attacker can send a specially crafted requests to the web server, trigger memory corruption and cause a denial of service condition or execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Install update from vendor's website.
Vulnerable software versionsSP C252DN: 1.04 - 1.06
SP C250DN: 1.04 - 1.06
SP C252SF: 1.08 - 1.12
SP C250SF: 1.08 - 1.12
External linkshttp://jvn.jp/en/jp/JVN11708203/index.html
http://www.ricoh.com/info/2019/0823_1/
http://www.ricoh-usa.com/en/support-and-download
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU21116
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-14308
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when parsing LPD packets. A remote attacker can send a specially crafted requests to the LPD service, trigger memory corruption and cause a denial of service condition or execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall update from vendor's website.
Vulnerable software versionsSP C252DN: 1.04 - 1.06
SP C250DN: 1.04 - 1.06
SP C252SF: 1.08 - 1.12
SP C250SF: 1.08 - 1.12
External linkshttp://jvn.jp/en/jp/JVN11708203/index.html
http://www.ricoh.com/info/2019/0823_1/
http://www.ricoh-usa.com/en/support-and-download
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.