We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-28038



Description

The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].

Reserved 2024-05-22 | Published 2024-11-26 | Updated 2024-12-10 | Assigner jpcert


CRITICAL: 9.0CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

Stack-based buffer overflow

Product status

See the information provided by Sharp Corporation listed under [References]
affected

See the information provided by Toshiba Tec Corporation listed under [References]
affected

References

global.sharp/products/copier/info/info_security_2024-05.html

jp.sharp/...ess/print/information/info_security_2024-05.html

www.toshibatec.com/information/20240531_02.html

www.toshibatec.co.jp/information/20240531_02.html

jvn.jp/en/vu/JVNVU93051062/

pierrekim.github.io/...-27-sharp-mfp-17-vulnerabilities.html

cve.org (CVE-2024-28038)

nvd.nist.gov (CVE-2024-28038)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-28038

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.