Xerox ColorQube 92XX Multiple OpenSSL Vulnerabilities (XRX15AD) (FREAK) (GHOST) (POODLE)

High Nessus Plugin ID 87322


The remote multi-function device is affected by multiple vulnerabilities.


According to its model number and software version, the remote Xerox ColorQube device is affected by multiple OpenSSL vulnerabilities :

- A man-in-the-middle (MitM) information disclosure vulnerability, known as POODLE, exists due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

- A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0204)

- A heap-based buffer overflow condition exists in the GNU C Library (glibc) due to improper validation of user-supplied input to the glibc functions
__nss_hostname_digits_dots(), gethostbyname(), and gethostbyname2(). This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. This vulnerability is known as GHOST. (CVE-2015-0235)


Apply the appropriate cumulative update as described in the Xerox security bulletin in the referenced URL.

See Also

Plugin Details

Severity: High

ID: 87322

File Name: xerox_xrx15ad_colorqube.nasl

Version: $Revision: 1.4 $

Type: remote

Family: Misc.

Published: 2015/12/11

Modified: 2016/05/24

Dependencies: 70368

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/h:xerox:colorqube

Required KB Items: www/xerox_colorqube, www/xerox_colorqube/model, www/xerox_colorqube/ssw

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/08/06

Vulnerability Publication Date: 2014/10/14

Exploitable With

Core Impact

Metasploit (Exim GHOST (glibc gethostbyname) Buffer Overflow)

Reference Information

CVE: CVE-2014-3566, CVE-2015-0204, CVE-2015-0235

BID: 70574, 71936, 72325

OSVDB: 113251, 116794, 117579

CERT: 243585, 577193, 967332