[VIM] interesting change in Xerox advisories
security curmudgeon
jericho at attrition.org
Wed Mar 8 01:52:28 EST 2006
We've discussed Xerox advisories in the past, and how vague they are:
Xerox, redundancy and being vague..
http://attrition.org/pipermail/vim/2005-July/000206.html
http://attrition.org/pipermail/vim/2005-July/000209.html
oh how i love xerox
http://attrition.org/pipermail/vim/2006-February/000563.html
http://attrition.org/pipermail/vim/2006-February/000564.html
Until now, their advisories always seem to be cut/paste of each other,
just changing the date and advisory ID number. Unspecified Auth Bypass,
Unspecified XSS, Unspecified DoS. This month however, they really broke
from the norm:
http://www.xerox.com/downloads/usa/en/c/cert_XRX06_002.pdf
XEROX SECURITY BULLETIN XRX06-002
03/06/06
[..]
Background
System Software Version 1.001.02.074 documented in this bulletin has
completed Common Criteria evaluation. The software applies to the products
listed below. The information provided here is consistent with the
security functional claims made in the Security Target. This Security
Target is available from the National Information Assurance Partnership
website's Validated Products List under the heading "Xerox CopyCentre (tm)
C65/75/90 Copier and WorkCentre (tm) Pro 65/75/90 Advanced Multifunction
System including Image Overwrite"
(http://niap.nist.gov/cc-scheme/st/ST_VID2021.html) or from your Xerox
representative.
System Software Version 1.001.02.074 incorporates fixes for the following
security-related problems:
* A buffer overflow vulnerability in the PostScript file interpreter code
that could cause a denial of service to an attacked machine.
* A specially constructed PostScript file to navigate through the
directory could cause a denial of service to an attacked machine.
* A specially constructed PostScript file set to expose TCP/IP ports could
cause a denial of service to an attacked machine.
* A memory corruption vulnerability in the web server code that could
cause a denial of service to an attacked machine.
* A vulnerability in the ESS/Network Controller could cause Immediate
Image Overwrite to fail in a specific instance with no indication after an
unexpected power loss.
System Software Version 1.001.02.716 has not completed Common Criteria
evaluation, but incorporates all of the security fixes identified above
for System Software Version 1.001.02.074 plus additional security fixes
identified in the applicable software release notes.
Customers have the option of requesting either System Software Version.
More information about the VIM
mailing list