---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Xerox MicroServer Web Server Multiple Vulnerabilities SECUNIA ADVISORY ID: SA16167 VERIFY ADVISORY: http://secunia.com/advisories/16167/ CRITICAL: Moderately critical IMPACT: Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, DoS WHERE: >From remote OPERATING SYSTEM: Xerox WorkCentre Pro http://secunia.com/product/4553/ Xerox WorkCentre http://secunia.com/product/4746/ DESCRIPTION: Multiple vulnerabilities have been reported in Xerox WorkCentre and WorkCentre Pro, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or cause a DoS (Denial of Service). 1) Some unspecified errors in the Xerox MicroServer web server can be exploited to bypass the user authentication. 2) Some unspecified errors within the handling of HTTP requests in the Xerox MicroServer web server can be exploited to cause a DoS or access certain files. 3) Certain unspecified input passed to the Xerox MicroServer web server is not properly sanitised before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site. The vulnerabilities affect the following products: * WorkCentre M35/M45/M55 (versions 2.028.11.000 through 2.97.20.050 or versions 4.84.16.000 through 4.97.20.050) * WorkCentre Pro 35/45/55 (versions 3.028.11.000 through 3.97.20.050) WorkCentre Pro 65/75/90 (versions 1.001.00.060 through 1.001.02.706) WorkCentre Pro 32/40 Color (versions 0.001.00.060 through 0.001.02.707) WorkCentre M165/M175 (versions 6.47.30.000 through 6.57.32.008 or versions 8.47.30.000 through 8.57.32.008) WorkCentre Pro 165/175 (versions 7.47.30.000 though 7.57.32.008) SOLUTION: Apply patch: http://www.xerox.com/downloads/usa/en/c/cert_P23_HTTP_Patch_AllWCP.zip PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: Xerox: http://www.xerox.com/downloads/usa/en/c/cert_XRX05_007.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------