cve-2010-0618
Vulnerability from cvelistv5
Published
2010-03-24 18:00
Modified
2024-08-07 00:52
Severity ?
EPSS score ?
Summary
The flood-protection feature in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser and inkjet printers and MarkNet devices allows remote attackers to cause a denial of service (TCP outage) by making many passive FTP connections and then aborting these connections.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:52:19.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11" }, { "name": "38906", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38906" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US" }, { "name": "39056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39056" }, { "name": "20100322 {PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/510285/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The flood-protection feature in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser and inkjet printers and MarkNet devices allows remote attackers to cause a denial of service (TCP outage) by making many passive FTP connections and then aborting these connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11" }, { "name": "38906", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38906" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US" }, { "name": "39056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39056" }, { "name": "20100322 {PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/510285/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The flood-protection feature in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser and inkjet printers and MarkNet devices allows remote attackers to cause a denial of service (TCP outage) by making many passive FTP connections and then aborting these connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11", "refsource": "MISC", "url": "http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11" }, { "name": "38906", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38906" }, { "name": "http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US", "refsource": "CONFIRM", "url": "http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US" }, { "name": "39056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39056" }, { "name": "20100322 {PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/510285/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0618", "datePublished": "2010-03-24T18:00:00", "dateReserved": "2010-02-11T00:00:00", "dateUpdated": "2024-08-07T00:52:19.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-0618\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-24T22:45:15.937\",\"lastModified\":\"2024-11-21T01:12:35.507\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The flood-protection feature in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser and inkjet printers and MarkNet devices allows remote attackers to cause a denial of service (TCP outage) by making many passive FTP connections and then aborting these connections.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica flood-protection en la base de los componentes IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, y Printcryption DLE en determinadas impresoras multifunci\u00f3n o l\u00e1ser de la marca Lexmark, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (indisponibilidad de TCP) a trav\u00e9s de varias conexiones FTP pasivas y posteriormente cancelando las conexiones.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:lexmark:z2420:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D331850-E67A-4183-9598-0A54CCD9CB77\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/39056\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/510285/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/38906\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/39056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.protekresearchlab.com/index.php?option=com_content\u0026view=article\u0026id=11\u0026Itemid=11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/510285/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/38906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Per: http://support.lexmark.com/index?page=content\u0026id=TE85\u0026locale=EN\u0026userlocale=EN_US#Printcryption\\r\\n\\r\\n\u0027Details\\r\\n\\r\\nLexmark products have connection flood protection mechanisms that limit the number of simultaneous network connections that can be made to the device on most TCP service ports.\\r\\n\\r\\n(21/FTP 79/Finger, 515/LPD, 631/IPP, 5001, 9100-9104, 9200, 9300, 9400, 9500-9501 \u0026 9600)\\r\\n\\r\\nThe FTP service exception handler does not properly maintain the state of the flood protection when passive FTP connections are aborted. Once a sufficient number of passive FTP connections have timed out (typically 15), the flood protection is enabled and is never reset.\\r\\n\\r\\nThe flood protection can be reset by resetting the network adapter, or by power cycling the device.\\r\\n\\r\\nThe firmware update that resolves this vulnerability automatically resets the flood protection after the \u201cNetwork Job Timeout\u201d has expired or 90 seconds if the \u201cNetwork Job Timeout\u201d is disabled.\u0027\"}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.