Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0141 Multiple vulnerabilities have been identied in MarkVision Enterprise 10 December 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MarkVision Enterprise Operating System: Windows VMware ESX Server Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-8742 CVE-2014-8741 Member content until: Friday, January 9 2015 OVERVIEW Lexmark has released version 2.1 for MarkVision Enterprise. [l - 2] IMPACT The vendor has provided the following information regarding the security vulnerabilities remediated: CVE-2014-8741: "MarkVision Enterprise contains a servlet named "GfdFileUploadServerlet". This servlet allows an unauthenticated remote attacker to upload files to arbitrary locations on the MarkVision Enterprise server, including the ability to upload and execute commands with the privilege of the MarkVision Enterprise application." [1] CVE-2014-8742: "MarkVision Enterprise contains a servlet named "ReportDownloadServlet". This servlet allows an unauthenticated remote attacker to download files from arbitrary locations on the MarkVision Enterprise server, including the ability access the authentication credentials for the MarkVision Enterprise database." [2] MITIGATION Lexmark recommends updating the application if you have a vulnerable version. [1 - 2] REFERENCES [1] MarkVision Enterprise Remote Code Execution Vulnerability Security Advisory http://support.lexmark.com/index?page=content&id=TE666&locale=EN&userlocale=EN_US [2] MarkVision Enterprise Input Validation Vulnerability Security Advisory http://support.lexmark.com/index?page=content&id=TE667&locale=EN&userlocale=EN_US AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVIjg5hLndAQH1ShLAQLk6RAAkcyDCHHxrjoKd/xtgAIUeXRbBFnFaUVE ZTzivM5/jH9eEjfJK07/ifJEn+SOjzWezBLQy/LDyb/4gT4zsuX/PZZwFnv+jHkc /+c/vm0ZvCXxW8Z5H9QVyaFdy2yRRbLvkDgl2jSvA48k0bWQBTUeDQtIEQC1HHYq hzTOCt2tVpJwkeazTSFSRtQ1rczvcRE0/AVRF2QfoGwbmp1SWwpaAnifKD6KR3+6 1/wTh/NXOQAW6LzLHcadtMPf+6KndbK8ZX/qp2tTjVZMR1K1jxVR7A0UI2WB35GR jIKoh3/xfMwqnCipnklexppmvXaTsYf6817dCbYl7kZipvoD6jFakVBJoFb3gvh1 s7fo8xoLSzESuzvlTN0lPmhiiyfMAsE+i3MHZQfzTyXP6Tm0HSn7b9A/oIpnrGPr rWg0RmgNOYTDEbw5t1eTbcQaVfNINy2nRJiQWZEzLG9Oe1c8AH2tG9x6jU9kICh9 IELWUvEpRhZT5xFSwrrNSxWIRDeZnz11bXqwx/cOdTQIXDpgUdCgrjWyGGxi/zRu 2uxb4AXQYWU3SHthd8+Lqy2EWiceCbU/6bAGUUuL7nycccN0fM1TeavUhIor6DUW /KmQQAN21e9Wk1TpvODUEQLACu84zi/zjt6ErO88FHvdyeeSelzhUqyQpU+XhREj m7cW9dAi08M= =BACx -----END PGP SIGNATURE-----