Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_RICOH_CVE-2019-14308.NASL
HistoryFeb 13, 2024 - 12:00 a.m.

RICOH SP C250 Series Buffer Overflow (CVE-2019-14308)

2024-02-1300:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
ricoh
buffer overflow
cve-2019-14308
denial of service
code execution
lpd service
tenable.ot
printer models
firmware versions

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.1%

Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:::::::* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:::::::, cpe:2.3:o:ricoh:sp_c252dn:-:::::::. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:::::::* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:::::::, cpe:2.3:o:ricoh:sp_c252sf:-:::::::.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501973);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/02/14");

  script_cve_id("CVE-2019-14308");

  script_name(english:"RICOH SP C250 Series Buffer Overflow (CVE-2019-14308)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Several Ricoh printers have multiple buffer overflows parsing LPD
packets, which allow an attacker to cause a denial of service or code
execution via crafted requests to the LPD service. Affected firmware
versions depend on the printer models. One affected configuration is
cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including)
1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*,
cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected
configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up
to (including) 1.12 running on
cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*,
cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"http://jvn.jp/en/jp/JVN11708203/index.html");
  script_set_attribute(attribute:"see_also", value:"https://www.ricoh.com/info/2019/0823_1/");
  script_set_attribute(attribute:"see_also", value:"https://www.ricoh-usa.com/en/support-and-download");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-14308");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119);

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/08/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/02/13");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c250dn_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c250sf_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c252dn_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ricoh:sp_c252sf_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/RICOH");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/RICOH');

var asset = tenable_ot::assets::get(vendor:'RICOH');

var vuln_cpes = {
    "cpe:/o:ricoh:sp_c250sf_firmware" :
        {"versionEndExcluding" : "1.13", "family" : "MFP"},
    "cpe:/o:ricoh:sp_c252sf_firmware" :
        {"versionEndExcluding" : "1.13", "family" : "MFP"},
    "cpe:/o:ricoh:sp_c250dn_firmware" :
        {"versionEndExcluding" : "1.07", "family" : "MFP"},
    "cpe:/o:ricoh:sp_c252dn_firmware" :
        {"versionEndExcluding" : "1.07", "family" : "MFP"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_HOLE);
VendorProductVersionCPE
ricohsp_c250dn_firmwarecpe:/o:ricoh:sp_c250dn_firmware
ricohsp_c250sf_firmwarecpe:/o:ricoh:sp_c250sf_firmware
ricohsp_c252dn_firmwarecpe:/o:ricoh:sp_c252dn_firmware
ricohsp_c252sf_firmwarecpe:/o:ricoh:sp_c252sf_firmware

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.1%

Related for TENABLE_OT_RICOH_CVE-2019-14308.NASL