---------------------------------------------------------------------- Monitor, Filter, and Manage Security Information - Filtering and Management of Secunia advisories - Overview, documentation, and detailed reports - Alerting via email and SMS Request Trial: https://ca.secunia.com/?f=l ---------------------------------------------------------------------- TITLE: Xerox MicroServer Web Server URL Handling Denial of Service SECUNIA ADVISORY ID: SA14557 VERIFY ADVISORY: http://secunia.com/advisories/14557/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network OPERATING SYSTEM: Xerox Document Centre http://secunia.com/product/2657/ DESCRIPTION: A vulnerability has been reported in Xerox Document Centre, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified memory corruption error in the MicroServer Web Server when processing URLs. This can be exploited via a specially crafted URL to cause the web server to restart. The vulnerability affects the following products: * Document Centre 535/545/555 (version 27.18.017 or prior) * Document Centre 460/470/480/490 (versions 19.01.037 through 19.05.521 and versions 19.5.902 through 19.5.912) * Document Centre 420/426/432/440 (with ESS 2.1.2 through 2.3.21) * Document Centre 425/432/440 (with ESS 3.0.5.4 through 3.2.30) * Document Centre 430 (with ESS 3.3.24 through 3.3.30) SOLUTION: Apply patch: http://www.xerox.com/downloads/usa/en/c/cert_P11_DCMemory_Patch.zip PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: http://www.xerox.com/downloads/usa/en/c/cert_XRX05_004.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------