First published: Mon Aug 26 2019(Updated: )
Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ricoh SP C250SF | <1.13 | |
Ricoh SP C250SF Firmware | ||
Ricoh SP C252sf Firmware | <1.13 | |
Ricoh SP C252sf Firmware | ||
Ricoh SP C250dn Firmware | <1.07 | |
Ricoh Sp C250sf | ||
Ricoh SP C252dn Firmware | <1.07 | |
Ricoh SP C252dn Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Ricoh printer vulnerability is CVE-2019-14300.
The severity of CVE-2019-14300 is critical with a CVSS score of 9.8.
The vulnerability CVE-2019-14300 can be exploited by sending crafted requests with malicious HTTP cookie headers to the affected Ricoh printer's web server.
The firmware versions affected by CVE-2019-14300 depend on the specific Ricoh printer model. For example, Ricoh Sp C250sf Firmware up to version 1.13 and Ricoh Sp C252sf Firmware up to version 1.13 are affected.
You can find more information about this vulnerability and updates from Ricoh at the following URLs: [http://jvn.jp/en/jp/JVN11708203/index.html](http://jvn.jp/en/jp/JVN11708203/index.html), [https://www.ricoh-usa.com/en/support-and-download](https://www.ricoh-usa.com/en/support-and-download), [https://www.ricoh.com/info/2019/0823_1/](https://www.ricoh.com/info/2019/0823_1/)