The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2024-11-26T07:37:06.324Z
Updated: 2024-12-10T14:57:54.916Z
Reserved: 2024-05-22T09:00:14.691Z
Link: CVE-2024-28038
Vulnrichment
Updated: 2024-12-10T14:57:47.795Z
NVD
Status : Received
Published: 2024-11-26T08:15:04.873
Modified: 2024-11-26T08:15:04.873
Link: CVE-2024-28038
Redhat
No data.