Xerox WorkCentre 77XX Multiple Vulnerabilities (XRX15R) (FREAK) (GHOST)

High Nessus Plugin ID 87327


The remote multi-function device is affected by multiple vulnerabilities.


According to its model number and software version, the remote Xerox WorkCentre 77XX device is affected by multiple vulnerabilities :

- A security feature bypass vulnerability, known as FREAK (Factoring attack on RSA-EXPORT Keys), exists due to the support of weak EXPORT_RSA cipher suites with keys less than or equal to 512 bits. A man-in-the-middle attacker may be able to downgrade the SSL/TLS connection to use EXPORT_RSA cipher suites which can be factored in a short amount of time, allowing the attacker to intercept and decrypt the traffic. (CVE-2015-0204)

- A heap-based buffer overflow condition exists in the GNU C Library (glibc) due to improper validation of user-supplied input to the glibc functions
__nss_hostname_digits_dots(), gethostbyname(), and gethostbyname2(). This allows a remote attacker to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code. This vulnerability is known as GHOST. (CVE-2015-0235)


Apply the appropriate cumulative update as described in the Xerox security bulletin in the referenced URL.

See Also

Plugin Details

Severity: High

ID: 87327

File Name: xerox_xrx15r.nasl

Version: $Revision: 1.2 $

Type: remote

Family: Misc.

Published: 2015/12/11

Modified: 2015/12/14

Dependencies: 18141

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/h:xerox:workcentre

Required KB Items: www/xerox_workcentre, www/xerox_workcentre/model, www/xerox_workcentre/ssw

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/10/19

Vulnerability Publication Date: 2015/01/06

Exploitable With

Core Impact

Metasploit (Exim GHOST (glibc gethostbyname) Buffer Overflow)

Reference Information

CVE: CVE-2015-0204, CVE-2015-0235

BID: 71936, 72325

OSVDB: 116794, 117579

CERT: 243585, 967332