This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of PostScript data. Crafted PostScript data can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Lexmark Mc3224i Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15982 has a high severity rating due to its ability to allow arbitrary code execution.
To fix ZDI-CAN-15982, update the firmware of the Lexmark MC3224i printer to the latest version available from Lexmark.
The vulnerability ZDI-CAN-15982 affects users of Lexmark MC3224i printers.
Yes, ZDI-CAN-15982 can be exploited by network-adjacent attackers without authentication.
ZDI-CAN-15982 is a code execution vulnerability that arises from improper parsing of PostScript data.