| Vulnerability Name: | CVE-2006-1136 (CCN-25172) | ||||||||
| Assigned: | 2006-03-06 | ||||||||
| Published: | 2006-03-06 | ||||||||
| Updated: | 2018-09-27 | ||||||||
| Summary: | Buffer overflow in the PostScript file interpreter code for Xerox CopyCentre and Xerox WorkCentre Pro, running software 1.001.02.073 or earlier, or 1.001.02.074 before 1.001.02.715, allows attackers to cause a denial of service via unknown vectors. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||
| References: | Source: MITRE Type: CNA CVE-2006-1136 Source: CCN Type: SA19146 Xerox CopyCentre / WorkCentre Pro Multiple Denial of Service Vulnerabilities Source: SECUNIA Type: Third Party Advisory 19146 Source: CCN Type: SECTRACK ID: 1015738 Xerox WorkCentre Pro Multiple PostScript Processing Errors Let Remote Users Deny Service Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015738 Source: OSVDB Type: Broken Link 23724 Source: CCN Type: OSVDB ID: 23724 XEROX CopyCentre/WorkCentre PostScript File Interpreter Overflow Source: BID Type: Third Party Advisory, VDB Entry 17014 Source: CCN Type: BID-17014 Xerox WorkCentre / CopyCentre Multiple Vulnerabilities Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-0857 Source: CCN Type: XEROX SECURITY BULLETIN XRX06-002 System software versions available to address denial of service and other vulnerabilities in ESS Source: CONFIRM Type: Broken Link, Vendor Advisory http://www.xerox.com/downloads/usa/en/c/cert_XRX06_002.pdf Source: XF Type: Third Party Advisory, VDB Entry xerox-postscript-interpreter-dos(25172) Source: XF Type: UNKNOWN xerox-postscript-interpreter-dos(25172) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||