Skip to Content Information Center
Lexmark XM5170

Lexmark XM5170

Lexmark Security Advisory: Glibc Getaddrinfo() Stack Buffer Overflow (CVE-2015-7547)

Lexmark Security Advisory:

Revision: 1.0
Last update: 7 March 1016
Public Release Date: 11 March 2016

Summary

Glibc getaddrinfo() stack buffer overflow.

A vulnerability was disclosed in the "glibc" client side resolver library that provides the potential for an attacker to execute arbitrary code on an affected system.

References

CVE: CVE-2015-7547

Details

On February 16, 2016 a buffer overflow vulnerability in glibc was announced in the send_dg() and send_vc() resolver functions was announced. The vulnerable functions can be accessed via getaddrinfoO. These vulnerabilities allow a remote attacker to either crash or execute arbitrary code on a vulnerable system via a crafted DNS response.

CVSSv3 Base Score:8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Impact Subscore:

5.9

Exploitability Subscore:

2.2

CVSSv2 Base Score:6.8 (AV:L/AC:M/AU:N/C:P/I:P/A:P)

Impact Subscore:

6.4

Exploitability Subscore:

8.6

CVSSv3 scores are calculated in accordance with CVSS version 3.0 (https://www.first.org/cvss/user-guide) CVSSv2 scores are calculated in accordance with CVSS version 2.0 (https://www.first.org/cvss/v2/guide)

Impact

Successful exploitation of this vulnerability can lead to the disclosure and/or modification of information and the ability to execute code on the affected system.

Affected Products

To determine a devices firmware level, select the "Settings" >"Reports" > "Menu Setting Page" menu item from the operator panel. If the firmware level listed under "Device Information" matches any level under "Affected Releases", then upgrade to a "Fixed Release".

Lexmark ModelsAffected ReleasesFixed Releases
CX820de, CX820dtfePP.02.057 and previousPP.02.058 and later
XC6152de, XC6152dtfePP.02.057 and previousPP.02.058 and later
CX825de, CX825dte, CX825dtfePP.02.057 and previousPP.02.058 and later
XC8155de, XC8155dtePP.02.057 and previousPP.02.058 and later
CX860de, CX860dte, CX860dtfePP.02.057 and previousPP.02.058 and later
XC8160de, XC8160dtePP.02.057 and previousPP.02.058 and later
CS820de, CS820dte, CS820dtfeYK.02.057 and previousYK.02.058 and later
C6160YK.02.057 and previousYK.02.058 and later
CS720de, CS720dteCB.02.057 and previousCB.02.058 and later
CS725de, CS725dteCB.02.057 and previousCB.02.058 and later
C4150CB.02.057 and previousCB.02.058 and later
CX725de, CX725dhe, CX725dtheATL.02.057 and previousATL.02.058 and later
XC4150ATL.02.057 and previousATL.02.058 and later
CS31xLW50.VYL.P592 and previous, LW60.VYL.P630 & LW60.VYL.P631LW50.VYL.P593 and later, LW60.VYL.P632 and later
CS41xLW50.VY2.P592 and previous, LW60.VY2.P630 & LW60.VY2.P631LW50.VY2.P593 and later, LW60.VY2.P632 and later
CS51xLW50.VY4.P592 and previous, LW60.VY4.P630 & LW60.VY4.P631LW50.VY4.P593 and later, LW60.VY4.P632 and later
CX310LW50.GM2.P592 and previous, LW60.GM2.P630 & LW60.GM2.P631LW50.GM2.P593 and later, LW60.GM2.P632 and later
CX410LW50.GM4.P592 and previous, LW60.GM4.P630 & LW60.GM4.P631LW50.GM4.P593 and later, LW60.GM4.P632 and later
CX510LW50.GM7.P592 and previous, LW60.GM7.P630 & LW60.GM7.P631LW50.GM7.P593 and later, LW60.GM7.P632 and later
XC2132LW50.GM7.P592 and previous, LW60.GM7.P630 & LW60.GM7.P631LW50.GM7.P593 and later, LW60.GM7.P632 and later
MS310LW50.PRL.P592 and previous, LW60.PRL.P630 & LW60.PRL.P631LW50.PRL.P593 and later, LW60.PRL.P632 and later
MS312LW50.PRL.P592 and previous, LW60.PRL.P630 & LW60.PRL.P631LW50.PRL.P593 and later, LW60.PRL.P632 and later
MS315LW50.TL.P592 and previous, LW60.TL.P630 & LW60.TL.P631LW50.TL.P593 and later, LW60.TL.P632 and later
MS410LW50.PRL.P592 and previous, LW60.PRL.P630 & LW60.PRL.P631LW50.PRL.P593 and later, LW60.PRL.P632 and later
MS415LW50.TL.P592 and previous, LW60.TL.P630 & LW60.TL.P631LW50.TL.P593 and later, LW60.TL.P632 and later
MS51xLW50.PR2.P592 and previous, LW60.PR2.P630 & LW60.PR2.P631LW50.PR2.P593 and later, LW60.PR2.P632 and later
MS610dn & MS610dtnLW50.PR2.P592 and previous, LW60.PR2.P630 & LW60.PR2.P631LW50.PR2.P593 and later, LW60.PR2.P632 and later
M1145 & M3150dnLW50.PR2.P592 and previous, LW60.PR2.P630 & LW60.PR2.P631LW50.PR2.P593 and later, LW60.PR2.P632 and later
MS610de & MS610dteLW50.PR4.P592 and previous, LW60.PR4.P630 & LW60.PR4.P631LW50.PR4.P593 and later, LW60.PR4.P632 and later
M3150LW50.PR4.P592 and previous, LW60.PR4.P630 & LW60.PR4.P631LW50.PR4.P593 and later, LW60.PR4.P632 and later
MS71xLW50.DN2.P592 and previous, LW60.DN2.P630 & LW60.DN2.P631LW50.DN2.P593 and later, LW60.DN2.P632 and later
MS810n, MS810dn & MS810dtnLW50.DN2.P592 and previous, LW60.DN2.P630 & LW60.DN2.P631LW50.DN2.P593 and later, LW60.DN2.P632 and later
MS811LW50.DN2.P592 and previous, LW60.DN2.P630 & LW60.DN2.P631LW50.DN2.P593 and later, LW60.DN2.P632 and later
MS812dn, MS812dtnLW50.DN2.P592 and previous, LW60.DN2.P630 & LW60.DN2.P631LW50.DN2.P593 and later, LW60.DN2.P632 and later
M5163dnLW50.DN2.P592 and previous, LW60.DN2.P630 & LW60.DN2.P631LW50.DN2.P593 and later, LW60.DN2.P632 and later
MS810deLW50.DN4.P592 and previous, LW60.DN4.P630 & LW60.DN4.P631LW50.DN4.P593 and later, LW60.DN4.P632 and later
M5155 & M5163LW50.DN4.P592 and previous, LW60.DN4.P630 & LW60.DN4.P631LW50.DN4.P593 and later, LW60.DN4.P632 and later
MS812deLW50.DN7.P592 and previous, LW60.DN7.P630 & LW60.DN7.P631LW50.DN7.P593 and later, LW60.DN7.P632 and later
M5170LW50.DN7.P592 and previous, LW60.DN7.P630 & LW60.DN7.P631LW50.DN7.P593 and later, LW60.DN7.P632 and later
MS91xLW50.SA.P592 and previous, LW60.SA.P630 & LW60.SA.P631LW50.SA.P593 and later, LW60.SA.P632 and later
MX310LW50.SB2.P592 and previous, LW60.SB2.P630 & LW60.SB2.P631LW50.SB2.P593 and later, LW60.SB2.P632 and later
XM1145LW50.SB4.P592 and previous, LW60.SB4.P630 & LW60.SB4.P631LW50.SB4.P593 and later, LW60.SB4.P632 and later
MX610 & MX611LW50.SB7.P592 and previous, LW60.SB7.P630 & LW60.SB7.P631LW50.SB7.P593 and later, LW60.SB7.P632 and later
XM3150LW50.SB7.P592 and previous, LW60.SB7.P630 & LW60.SB7.P631LW50.SB7.P593 and later, LW60.SB7.P632 and later
MX71xLW50.TU.P592 and previous, LW60.TU.P630 & LW60.TU.P631LW50.TU.P593 and later, LW60.TU.P632 and later
MX81xLW50.TU.P592 and previous, LW60.TU.P630 & LW60.TU.P631LW50.TU.P593 and later, LW60.TU.P632 and later
XM51xx & XM71xxLW50.TU.P592 and previous, LW60.TU.P630 & LW60.TU.P631LW50.TU.P593 and later, LW60.TU.P632 and later
MX91xLW50.MG.P592 and previous, LW60.MG.P630 & LW60.MG.P631LW50.MG.593 and later, LW60.MG.P632 and later
MX6500eLW50.JD.P592 and previous, LW60.JD.P630 & LW60.JD.P631LW50.JD.593 and later, LW60.JD.P632 and later

Obtaining Updated Software

To obtain firmware that resolves this issue, or if you have special code, please contact Lexmark's Technical Support Center at http://support.lexmark.com to find your local support center.

Workarounds

Lexmark recommends updating firmware to address this issue.

Exploitation and Public Announcements

Lexmark is not aware of any malicious use against Lexmark products of the vulnerability described in this advisory.

Status of this Notice:

THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND IS PROVIDED WITHOUT ANY EXPRESS OR IMPLIED GUARANTEE OR WARRANTY WHATSOEVER, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR USE OR PURPOSE. LEXMARK RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

Distribution

This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts.

Future updates to this document will be on Lexmark’s web site at the same location.

Revision History

RevisionDateReason
1.0 7 – March 2016 Initial Public Release

LEGACY ID: TE753

Was this article helpful?
Top