Lexmark Security Advisory:
|Last update:||9 December 2014|
|Public Release Date:||9 December 2014|
Remote code execution vulnerability
MarkVision Enterprise contains a vulnerability that allows an unauthenticated remote attacker to upload files and execute arbitrary commands with the privilege of the MarkVision Enterprise application.
MarkVision Enterprise contains a servlet named “GfdFileUploadServerlet”. This servlet allows an unauthenticated remote attacker to upload files to arbitrary locations on the MarkVision Enterprise server, including the ability to upload and execute commands with the privilege of the MarkVision Enterprise application.
Successful exploitation of this vulnerability can lead to the disclosure of data stored in MarkVision Enterprise, and the ability to execute code within the MarkVision platform.
Vulnerability Scoring Details
|CVSS Base Score:||10|
|Access Vector: Network||Confidentiality: Complete|
|Access Complexity: Low||Integrity: Complete|
|Authentication: None||Availability: Complete|
CVSS scores are calculated in accordance with CVSS version 2.0 (http://www.first.org/cvss/cvss-guide.html)
Lexmark recommends updating the application if you have a vulnerable version.
Software Versions and Fixes
Lexmark is not aware of any malicious use of the vulnerability described in this advisory.
Lexmark would like to thank rgod working with HP's Zero Day Initiative (ZDI) for bringing this issue to our attention.
Status of this Notice:
This document is provided on an "as is" basis and is provided without any express or implied guarantee or warranty whatsoever, including but not limited to the warranties of merchantability and fitness for a particular use or purpose. Lexmark reserves the right to change or update this document at any time.
This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts.
Future updates to this document will be posted on Lexmark’s website at the same location.
9 - December - 2014
|Initial Public Release|