From 24e626069807a6f0b7b99a766ffba939ee248031 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 13 Sep 2019 05:00:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/14xxx/CVE-2019-14300.json | 7 ++++++- 2019/14xxx/CVE-2019-14305.json | 7 ++++++- 2019/14xxx/CVE-2019-14307.json | 7 ++++++- 2019/14xxx/CVE-2019-14308.json | 5 +++++ 4 files changed, 23 insertions(+), 3 deletions(-) diff --git a/2019/14xxx/CVE-2019-14300.json b/2019/14xxx/CVE-2019-14300.json index 05b36c561a2..f5cd45f0912 100644 --- a/2019/14xxx/CVE-2019-14300.json +++ b/2019/14xxx/CVE-2019-14300.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected congiguration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected congiguration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." + "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, @@ -61,6 +61,11 @@ "url": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "name": "https://www.ricoh.com/info/2019/0823_1/" + }, + { + "refsource": "JVN", + "name": "JVN#11708203", + "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14305.json b/2019/14xxx/CVE-2019-14305.json index 78b9c1b2764..efa454ac117 100644 --- a/2019/14xxx/CVE-2019-14305.json +++ b/2019/14xxx/CVE-2019-14305.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected congiguration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected congiguration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." + "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for Wi-Fi, mDNS, POP3, SMTP, and notification alerts, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, @@ -61,6 +61,11 @@ "url": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "name": "https://www.ricoh.com/info/2019/0823_1/" + }, + { + "refsource": "JVN", + "name": "JVN#11708203", + "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14307.json b/2019/14xxx/CVE-2019-14307.json index 8b1a168d4d5..9f49d63432c 100644 --- a/2019/14xxx/CVE-2019-14307.json +++ b/2019/14xxx/CVE-2019-14307.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected congiguration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected congiguration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." + "value": "Several Ricoh printers have multiple buffer overflows parsing HTTP parameter settings for SNMP, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*." } ] }, @@ -61,6 +61,11 @@ "url": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "name": "https://www.ricoh.com/info/2019/0823_1/" + }, + { + "refsource": "JVN", + "name": "JVN#11708203", + "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14308.json b/2019/14xxx/CVE-2019-14308.json index ffbb1158af2..d085477068a 100644 --- a/2019/14xxx/CVE-2019-14308.json +++ b/2019/14xxx/CVE-2019-14308.json @@ -61,6 +61,11 @@ "url": "https://www.ricoh.com/info/2019/0823_1/", "refsource": "MISC", "name": "https://www.ricoh.com/info/2019/0823_1/" + }, + { + "refsource": "JVN", + "name": "JVN#11708203", + "url": "http://jvn.jp/en/jp/JVN11708203/index.html" } ] },