The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
History

Tue, 10 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 07:45:00 +0000

Type Values Removed Values Added
Description The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2024-11-26T07:37:06.324Z

Updated: 2024-12-10T14:57:54.916Z

Reserved: 2024-05-22T09:00:14.691Z

Link: CVE-2024-28038

cve-icon Vulnrichment

Updated: 2024-12-10T14:57:47.795Z

cve-icon NVD

Status : Received

Published: 2024-11-26T08:15:04.873

Modified: 2024-11-26T08:15:04.873

Link: CVE-2024-28038

cve-icon Redhat

No data.