ID XEROX_XRX10-001.NASL Type nessus Reporter Tenable Modified 2017-08-16T00:00:00
Description
According to its model number and software version, the remote host is a Xerox WorkCentre device that could allow unauthorized access to the Network Controller directory structure using a specially crafted PostScript file.
A remote attacker may be able to leverage this to gain access to sensitive information from the affected device.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(44943);
script_version("$Revision: 1.6 $");
script_cvs_date("$Date: 2017/08/16 14:26:36 $");
script_cve_id("CVE-2010-0549");
script_osvdb_id(61925);
script_name(english:"Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)");
script_summary(english:"Checks Net Controller Software version of Xerox WorkCentre devices");
script_set_attribute(
attribute:"synopsis",
value:
"The remote multi-function device allows an attacker to gain access to
the Network Controller directory structure without authorization."
);
script_set_attribute(
attribute:"description",
value:
"According to its model number and software version, the remote host
is a Xerox WorkCentre device that could allow unauthorized access to
the Network Controller directory structure using a specially crafted
PostScript file.
A remote attacker may be able to leverage this to gain access to
sensitive information from the affected device."
);
script_set_attribute(attribute:"see_also", value:"http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf");
script_set_attribute(
attribute:"solution",
value:
"Apply the P40v1 patch as described in the Xerox security bulletin
referenced above."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(200);
script_set_attribute(attribute:"vuln_publication_date", value:"2010/01/22");
script_set_attribute(attribute:"patch_publication_date", value:"2010/01/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/03/01");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/h:xerox:workcentre");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.");
script_dependencies("xerox_workcentre_detect.nasl");
script_require_keys("www/xerox_workcentre");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
# This function returns TRUE if the version string ver lies in
# the range [low, high].
function ver_inrange(ver, low, high)
{
local_var ver_parts, low_parts, high_parts, i, p, low_p, high_p;
if (isnull(ver) || isnull(low) || isnull(high)) return FALSE;
# Split levels into parts.
ver_parts = split(ver, sep:".", keep:0);
low_parts = split(low, sep:".", keep:0);
high_parts = split(high, sep:".", keep:0);
# Compare each part.
i = 0;
while (ver_parts[i] != NULL)
{
p = int(ver_parts[i]);
low_p = int(low_parts[i]);
if (low_p == NULL) low_p = 0;
high_p = int(high_parts[i]);
if (high_p == NULL) high_p = 0;
if (p > low_p && p < high_p) return TRUE;
if (p < low_p || p > high_p) return FALSE;
++i;
}
return TRUE;
}
# Check whether the device is vulnerable.
if (get_kb_item("www/xerox_workcentre"))
{
model = get_kb_item_or_exit("www/xerox_workcentre/model");
ssw = get_kb_item_or_exit("www/xerox_workcentre/ssw");
if (ssw && "." >< ssw) ssw = strstr(ssw, ".") - ".";
ess = get_kb_item_or_exit("www/xerox_workcentre/ess");
# No need to check further if ESS has ".P40v1" since that
# indicates the patch has already been applied.
if (ess && ".P40v1" >< ess) audit(AUDIT_HOST_NOT, "affected");
# Test model number and software version against those in Xerox's security bulletin.
if (
# nb: model 6400 [060.079.11410, 060.079.29310]
model =~ "^6400($|[^0-9])" &&
ver_inrange(ver:ess, low:"060.079.11410", high:"060.079.29310")
)
{
if (report_verbosity > 0)
{
report =
'\n Model : ' + model +
'\n ESS Controller version : ' + ess + '\n';
security_warning(port:0, extra:report);
}
else security_warning(0);
exit(0);
}
}
audit(AUDIT_HOST_NOT, "affected");
{"hash": "cdfbe435054f9bb6244568363a2514b746af3fe44f390c031d2d2cfe7bf595f2", "naslFamily": "Misc.", "id": "XEROX_XRX10-001.NASL", "lastseen": "2017-10-29T13:41:21", "viewCount": 0, "hashmap": [{"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "b08db2ae55a278b3b88004ac380a56ce", "key": "cpe"}, {"hash": "2fe4d261563a275a76fac7d106452bb8", "key": "cvelist"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "7add5aa84ce6a4741687350d9352eefa", "key": "description"}, {"hash": "e1dea902e0028ae5877d1a68672bc52c", "key": "href"}, {"hash": "c57caa13a9dffde9eebc944d367434c5", "key": "modified"}, {"hash": "f988dc6e0b4d047c838adcca890ea132", "key": "naslFamily"}, {"hash": "d2404acc0827133844e0a3c396af3dd0", "key": "pluginID"}, {"hash": "46f3091912fcebfc266275f21dd6b0a0", "key": "published"}, {"hash": "60537796d91827f31386bf270e40e6d4", "key": "references"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "2570400728b3df487246131a32d3144d", "key": "sourceData"}, {"hash": "84cac9d2f5cfa5a5570b8c3d64059b38", "key": "title"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}], "bulletinFamily": "scanner", "cpe": ["cpe:/h:xerox:workcentre"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "edition": 3, "enchantments": {"vulnersScore": 2.1}, "type": "nessus", "description": "According to its model number and software version, the remote host is a Xerox WorkCentre device that could allow unauthorized access to the Network Controller directory structure using a specially crafted PostScript file.\n\nA remote attacker may be able to leverage this to gain access to sensitive information from the affected device.", "title": "Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)", "history": [{"bulletin": {"hash": "ed2f149b623a34b978168a4d42ffde34c85dae3cfafc72148e30de8a40827f7d", "naslFamily": "Misc.", "id": "XEROX_XRX10-001.NASL", "lastseen": "2016-09-26T17:25:30", "enchantments": {}, "hashmap": [{"hash": "5e1828202de60d52063472231e7cc46b", "key": "modified"}, {"hash": "46f3091912fcebfc266275f21dd6b0a0", "key": "published"}, {"hash": "7add5aa84ce6a4741687350d9352eefa", "key": "description"}, {"hash": "2fe4d261563a275a76fac7d106452bb8", "key": "cvelist"}, {"hash": "84cac9d2f5cfa5a5570b8c3d64059b38", "key": "title"}, {"hash": "f988dc6e0b4d047c838adcca890ea132", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "b0f274d477beba6eedd5a6f693a6eefd", "key": "sourceData"}, {"hash": "e1dea902e0028ae5877d1a68672bc52c", "key": "href"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "d2404acc0827133844e0a3c396af3dd0", "key": "pluginID"}, {"hash": "60537796d91827f31386bf270e40e6d4", "key": "references"}], "bulletinFamily": "scanner", "history": [], "edition": 1, "type": "nessus", "description": "According to its model number and software version, the remote host is a Xerox WorkCentre device that could allow unauthorized access to the Network Controller directory structure using a specially crafted PostScript file.\n\nA remote attacker may be able to leverage this to gain access to sensitive information from the affected device.", "viewCount": 0, "title": "Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "objectVersion": "1.2", "cvelist": ["CVE-2010-0549"], "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44943);\n script_version(\"$Revision: 1.5 $\");\n script_cvs_date(\"$Date: 2013/11/05 20:39:26 $\");\n\n script_cve_id(\"CVE-2010-0549\");\n script_osvdb_id(61925);\n\n script_name(english:\"Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)\");\n script_summary(english:\"Checks Net Controller Software version of Xerox WorkCentre devices\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote multi-function device allows an attacker to gain access to\nthe Network Controller directory structure without authorization.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"According to its model number and software version, the remote host\nis a Xerox WorkCentre device that could allow unauthorized access to\nthe Network Controller directory structure using a specially crafted\nPostScript file.\n\nA remote attacker may be able to leverage this to gain access to\nsensitive information from the affected device.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Apply the P40v1 patch as described in the Xerox security bulletin\nreferenced above.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cwe_id(200);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/03/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:xerox:workcentre\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.\");\n\n script_dependencies(\"xerox_workcentre_detect.nasl\");\n script_require_keys(\"www/xerox_workcentre\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# This function returns TRUE if the version string ver lies in\n# the range [low, high].\nfunction ver_inrange(ver, low, high)\n{\n local_var ver_parts, low_parts, high_parts, i, p, low_p, high_p;\n\n if (isnull(ver) || isnull(low) || isnull(high)) return FALSE;\n\n # Split levels into parts.\n ver_parts = split(ver, sep:\".\", keep:0);\n low_parts = split(low, sep:\".\", keep:0);\n high_parts = split(high, sep:\".\", keep:0);\n\n # Compare each part.\n i = 0;\n while (ver_parts[i] != NULL)\n {\n p = int(ver_parts[i]);\n low_p = int(low_parts[i]);\n if (low_p == NULL) low_p = 0;\n high_p = int(high_parts[i]);\n if (high_p == NULL) high_p = 0;\n\n if (p > low_p && p < high_p) return TRUE;\n if (p < low_p || p > high_p) return FALSE;\n ++i;\n }\n return TRUE;\n}\n\n# Check whether the device is vulnerable.\nif (get_kb_item(\"www/xerox_workcentre\"))\n{\n model = get_kb_item_or_exit(\"www/xerox_workcentre/model\");\n ssw = get_kb_item_or_exit(\"www/xerox_workcentre/ssw\");\n if (ssw && \".\" >< ssw) ssw = strstr(ssw, \".\") - \".\";\n ess = get_kb_item_or_exit(\"www/xerox_workcentre/ess\");\n\n # No need to check further if ESS has \".P40v1\" since that\n # indicates the patch has already been applied.\n if (ess && \".P40v1\" >< ess) audit(AUDIT_HOST_NOT, \"affected\");\n\n # Test model number and software version against those in Xerox's security bulletin.\n if (\n # nb: model 6400 [060.079.11410, 060.079.29310]\n model =~ \"^6400($|[^0-9])\" &&\n ver_inrange(ver:ess, low:\"060.079.11410\", high:\"060.079.29310\")\n )\n {\n if (report_verbosity > 0)\n {\n report =\n '\\n Model : ' + model +\n '\\n ESS Controller version : ' + ess + '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n }\n}\naudit(AUDIT_HOST_NOT, \"affected\");\n", "published": "2010-03-01T00:00:00", "pluginID": "44943", "references": ["http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"], "reporter": "Tenable", "modified": "2013-11-05T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44943"}, "lastseen": "2016-09-26T17:25:30", "edition": 1, "differentElements": ["modified", "sourceData"]}, {"bulletin": {"hash": "8f711889333dbe24ad9158d7705d6903cb814895a1786e36f20295c7b4be5a2c", "naslFamily": "Misc.", "edition": 2, "lastseen": "2017-08-17T00:08:08", "enchantments": {}, "hashmap": [{"hash": "46f3091912fcebfc266275f21dd6b0a0", "key": "published"}, {"hash": "7add5aa84ce6a4741687350d9352eefa", "key": "description"}, {"hash": "2fe4d261563a275a76fac7d106452bb8", "key": "cvelist"}, {"hash": "c57caa13a9dffde9eebc944d367434c5", "key": "modified"}, {"hash": "84cac9d2f5cfa5a5570b8c3d64059b38", "key": "title"}, {"hash": "f988dc6e0b4d047c838adcca890ea132", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "2570400728b3df487246131a32d3144d", "key": "sourceData"}, {"hash": "e1dea902e0028ae5877d1a68672bc52c", "key": "href"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "d2404acc0827133844e0a3c396af3dd0", "key": "pluginID"}, {"hash": "60537796d91827f31386bf270e40e6d4", "key": "references"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "bulletinFamily": "scanner", "cpe": [], "history": [], "id": "XEROX_XRX10-001.NASL", "type": "nessus", "description": "According to its model number and software version, the remote host is a Xerox WorkCentre device that could allow unauthorized access to the Network Controller directory structure using a specially crafted PostScript file.\n\nA remote attacker may be able to leverage this to gain access to sensitive information from the affected device.", "viewCount": 0, "title": "Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "objectVersion": "1.3", "cvelist": ["CVE-2010-0549"], "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44943);\n script_version(\"$Revision: 1.6 $\");\n script_cvs_date(\"$Date: 2017/08/16 14:26:36 $\");\n\n script_cve_id(\"CVE-2010-0549\");\n script_osvdb_id(61925);\n\n script_name(english:\"Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)\");\n script_summary(english:\"Checks Net Controller Software version of Xerox WorkCentre devices\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote multi-function device allows an attacker to gain access to\nthe Network Controller directory structure without authorization.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"According to its model number and software version, the remote host\nis a Xerox WorkCentre device that could allow unauthorized access to\nthe Network Controller directory structure using a specially crafted\nPostScript file.\n\nA remote attacker may be able to leverage this to gain access to\nsensitive information from the affected device.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Apply the P40v1 patch as described in the Xerox security bulletin\nreferenced above.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(200);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/03/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:xerox:workcentre\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.\");\n\n script_dependencies(\"xerox_workcentre_detect.nasl\");\n script_require_keys(\"www/xerox_workcentre\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# This function returns TRUE if the version string ver lies in\n# the range [low, high].\nfunction ver_inrange(ver, low, high)\n{\n local_var ver_parts, low_parts, high_parts, i, p, low_p, high_p;\n\n if (isnull(ver) || isnull(low) || isnull(high)) return FALSE;\n\n # Split levels into parts.\n ver_parts = split(ver, sep:\".\", keep:0);\n low_parts = split(low, sep:\".\", keep:0);\n high_parts = split(high, sep:\".\", keep:0);\n\n # Compare each part.\n i = 0;\n while (ver_parts[i] != NULL)\n {\n p = int(ver_parts[i]);\n low_p = int(low_parts[i]);\n if (low_p == NULL) low_p = 0;\n high_p = int(high_parts[i]);\n if (high_p == NULL) high_p = 0;\n\n if (p > low_p && p < high_p) return TRUE;\n if (p < low_p || p > high_p) return FALSE;\n ++i;\n }\n return TRUE;\n}\n\n# Check whether the device is vulnerable.\nif (get_kb_item(\"www/xerox_workcentre\"))\n{\n model = get_kb_item_or_exit(\"www/xerox_workcentre/model\");\n ssw = get_kb_item_or_exit(\"www/xerox_workcentre/ssw\");\n if (ssw && \".\" >< ssw) ssw = strstr(ssw, \".\") - \".\";\n ess = get_kb_item_or_exit(\"www/xerox_workcentre/ess\");\n\n # No need to check further if ESS has \".P40v1\" since that\n # indicates the patch has already been applied.\n if (ess && \".P40v1\" >< ess) audit(AUDIT_HOST_NOT, \"affected\");\n\n # Test model number and software version against those in Xerox's security bulletin.\n if (\n # nb: model 6400 [060.079.11410, 060.079.29310]\n model =~ \"^6400($|[^0-9])\" &&\n ver_inrange(ver:ess, low:\"060.079.11410\", high:\"060.079.29310\")\n )\n {\n if (report_verbosity > 0)\n {\n report =\n '\\n Model : ' + model +\n '\\n ESS Controller version : ' + ess + '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n }\n}\naudit(AUDIT_HOST_NOT, \"affected\");\n", "published": "2010-03-01T00:00:00", "pluginID": "44943", "references": ["http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"], "reporter": "Tenable", "modified": "2017-08-16T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44943"}, "lastseen": "2017-08-17T00:08:08", "edition": 2, "differentElements": ["cpe"]}], "objectVersion": "1.3", "cvelist": ["CVE-2010-0549"], "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44943);\n script_version(\"$Revision: 1.6 $\");\n script_cvs_date(\"$Date: 2017/08/16 14:26:36 $\");\n\n script_cve_id(\"CVE-2010-0549\");\n script_osvdb_id(61925);\n\n script_name(english:\"Xerox WorkCentre Crafted PostScript File Handling Directory Access (XRX10-001)\");\n script_summary(english:\"Checks Net Controller Software version of Xerox WorkCentre devices\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote multi-function device allows an attacker to gain access to\nthe Network Controller directory structure without authorization.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"According to its model number and software version, the remote host\nis a Xerox WorkCentre device that could allow unauthorized access to\nthe Network Controller directory structure using a specially crafted\nPostScript file.\n\nA remote attacker may be able to leverage this to gain access to\nsensitive information from the affected device.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Apply the P40v1 patch as described in the Xerox security bulletin\nreferenced above.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(200);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/03/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:xerox:workcentre\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.\");\n\n script_dependencies(\"xerox_workcentre_detect.nasl\");\n script_require_keys(\"www/xerox_workcentre\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\n# This function returns TRUE if the version string ver lies in\n# the range [low, high].\nfunction ver_inrange(ver, low, high)\n{\n local_var ver_parts, low_parts, high_parts, i, p, low_p, high_p;\n\n if (isnull(ver) || isnull(low) || isnull(high)) return FALSE;\n\n # Split levels into parts.\n ver_parts = split(ver, sep:\".\", keep:0);\n low_parts = split(low, sep:\".\", keep:0);\n high_parts = split(high, sep:\".\", keep:0);\n\n # Compare each part.\n i = 0;\n while (ver_parts[i] != NULL)\n {\n p = int(ver_parts[i]);\n low_p = int(low_parts[i]);\n if (low_p == NULL) low_p = 0;\n high_p = int(high_parts[i]);\n if (high_p == NULL) high_p = 0;\n\n if (p > low_p && p < high_p) return TRUE;\n if (p < low_p || p > high_p) return FALSE;\n ++i;\n }\n return TRUE;\n}\n\n# Check whether the device is vulnerable.\nif (get_kb_item(\"www/xerox_workcentre\"))\n{\n model = get_kb_item_or_exit(\"www/xerox_workcentre/model\");\n ssw = get_kb_item_or_exit(\"www/xerox_workcentre/ssw\");\n if (ssw && \".\" >< ssw) ssw = strstr(ssw, \".\") - \".\";\n ess = get_kb_item_or_exit(\"www/xerox_workcentre/ess\");\n\n # No need to check further if ESS has \".P40v1\" since that\n # indicates the patch has already been applied.\n if (ess && \".P40v1\" >< ess) audit(AUDIT_HOST_NOT, \"affected\");\n\n # Test model number and software version against those in Xerox's security bulletin.\n if (\n # nb: model 6400 [060.079.11410, 060.079.29310]\n model =~ \"^6400($|[^0-9])\" &&\n ver_inrange(ver:ess, low:\"060.079.11410\", high:\"060.079.29310\")\n )\n {\n if (report_verbosity > 0)\n {\n report =\n '\\n Model : ' + model +\n '\\n ESS Controller version : ' + ess + '\\n';\n security_warning(port:0, extra:report);\n }\n else security_warning(0);\n exit(0);\n }\n}\naudit(AUDIT_HOST_NOT, \"affected\");\n", "published": "2010-03-01T00:00:00", "pluginID": "44943", "references": ["http://www.xerox.com/downloads/usa/en/c/cert_XRX10-001_v1.0.pdf"], "reporter": "Tenable", "modified": "2017-08-16T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44943"}
{"result": {"cve": [{"id": "CVE-2010-0549", "type": "cve", "title": "CVE-2010-0549", "description": "Unspecified vulnerability in the Network Controller in Xerox WorkCentre 6400 System Software 060.070.109.11407 through 060.070.109.29510, and Net Controller 060.079.11410 through 060.079.29310, allows remote attackers to access \"directory structure\" via a crafted PostScript file, aka \"Unauthorized Directory Structure Access Vulnerability.\"", "published": "2010-02-04T15:15:50", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0549", "cvelist": ["CVE-2010-0549"], "lastseen": "2016-09-03T13:31:48"}]}}