cve-2018-17944
Vulnerability from cvelistv5
Published
2019-03-12 16:00
Modified
2024-08-05 11:01
Severity ?
EPSS score ?
Summary
On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server's hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://support.lexmark.com/index?page=content&id=TE909 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.lexmark.com/index?page=content&id=TE909 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:01:14.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lexmark.com/index?page=content\u0026id=TE909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server\u0027s hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-12T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lexmark.com/index?page=content\u0026id=TE909" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server\u0027s hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.lexmark.com/index?page=content\u0026id=TE909", "refsource": "CONFIRM", "url": "http://support.lexmark.com/index?page=content\u0026id=TE909" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17944", "datePublished": "2019-03-12T16:00:00", "dateReserved": "2018-10-03T00:00:00", "dateUpdated": "2024-08-05T11:01:14.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-17944\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-03-12T16:29:00.220\",\"lastModified\":\"2024-11-21T03:55:15.330\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server\u0027s hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change.\"},{\"lang\":\"es\",\"value\":\"En determinados dispositivos de Lexmark que se comunican con un servidor LDAP o SMTP, un administrador malicioso puede descubrir credenciales LDAP o SMTP, cambiando el nombre de host del servidor a uno que ya controlan y, posteriormente, capturando las credenciales que se env\u00edan a dicho servidor. Esto ocurre debido a que las credenciales almacenadas no se eliminan de forma autom\u00e1tica a la hora de cambiar dicho tipo de nombre de host.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:cx725h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B374B3-DF33-431D-A258-9A70723E84C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:cx725h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23C14E13-FA74-4661-9A20-675720FD190A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:cx820_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C281F5-C167-4BDF-B45E-C98FC55A988C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EBF8770-3E91-49BC-8AE9-E82E6399D802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:cx825_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96158578-C7B9-425E-8CAD-C87A35278F6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7BCA73-8C60-49F5-A62C-126D62A8D701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:cx860_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA418CE-C7A9-4D11-B7F3-944A6CAD3173\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86727DB5-FC4C-432C-BB8B-AFBD166A96A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:xc4150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484C34E9-06C1-471A-91CE-D77CD2084B7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:xc4150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A27B92-5F83-4280-93EA-31F115408405\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:xc6152_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5FF572D-9C39-47A8-BABC-27E00CDDE766\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937C63CA-228C-4142-BB3A-F25A09908F92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:xc8155_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3C1530-2425-4BBE-930D-501AEFEC15DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6BE517-427A-4335-8FCD-8A721A9E507C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lexmark:xc8160_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8973ACA9-AF51-4960-9812-E06DFD3FB451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E731776-CCAE-467E-9423-1155B280358B\"}]}]}],\"references\":[{\"url\":\"http://support.lexmark.com/index?page=content\u0026id=TE909\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.lexmark.com/index?page=content\u0026id=TE909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.