-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1845
               Xerox Mini Bulletin XRX19E for Xerox AltaLink
                                23 May 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Xerox AltaLink
Publisher:         Xerox
Operating System:  Printer
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://rss.xerox.com/~r/security-bulletins/~3/TGZXGj7DClU/cert_Security_Mini_Bulletin_XRX19E-1.pdf

- --------------------------BEGIN INCLUDED TEXT--------------------

Mini Bulletin XRX19E

Xerox AltaLink B8045/B8055/B8065/B8075/B8090
Xerox AltaLink C8030/C8035/C8045/C8055/C8070
SPAR Release R19-04 100.00X.059.13300

Bulletin Date: May 13, 2019
Updated: May 20,2019

Purpose

This Bulletin is intended ONLY for the specific security problems identified below. The problems identified
have been rated a criticality level of IMPORTANT. This SPAR release uses OpenSSL version 1.0.2n.

Includes fix for the following:

# Unnecessary open port detected on a vulnerability scan
# Remote Command Execution vulnerability
# Possible security event detected at a customer site - Prevent an occurrence of memory corruption

Acknowledgement Xerox would like to thank Raphael Rigo from the AIRBUS Security Lab for informing us of the
Remote Command Execution vulnerability.

Software Release Details

If your software is higher or equal to the versions listed below no action is needed.

Otherwise, please review this bulletin and consider installation of this version.

| Model               | AltaLink B80xx[0]  | AltaLink C8030/C8035  | AltaLink C8045/C8055  | AltaLink C8070      |
| System SW version   | 100.008.059.13300  | 100.001.059.13300     | 100.002.059.13300     | 100.003.059.13300   |
| Update for BDC*     | [1]                | [2]                   | [3]                   | [4]                 |
| Update for AltBoot  | [5]                | [6]                   | [7]                   | [8]                 |

Unzip the file to a known location on your workstation/computer.
*Binary Disk Compression. Customers should use this method for upgrading their devices.

[0] AltaLink B8045/B8055/B8065/B8075/B8090
[1] https://www.support.xerox.com/support/altalink-b8000-series/file-download/engb.html?&contentId=138064
[2] https://www.support.xerox.com/support/altalink-c8000-series/file-download/engb.html?&contentId=143720
[3] https://www.support.xerox.com/support/altalink-c8000-series/file-download/engb.html?&contentId=138062
[4] https://www.support.xerox.com/support/altalink-c8000-series/file-download/engb.html?&contentId=138063
[5] https://www.support.xerox.com/support/altalink-b8000-series/file-download/enus.html?&contentId=144045
[6] https://www.support.xerox.com/support/altalink-c8000-series/file-download/enus.html?&contentId=144046
[7] https://www.support.xerox.com/support/altalink-c8000-series/file-download/enus.html?&contentId=144047
[8] https://www.support.xerox.com/support/altalink-c8000-series/file-download/enus.html?&contentId=144048

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXOYj9maOgq3Tt24GAQjdaBAAlx8o9wPv+yltWYkrn6He6KE2Auqhs0qU
AlXj+fvSbFV5y6+Foqun+d5o3gtU7hTYhQ21uINL26/Tw/Ur+PHZfQaKbVY5qs0l
Y5oKBQPULbLORei4oM1kUrTLKJMWmd38A2jVTcjlna4yfZcmGuwKB9rdS50rbFCp
DWxYKn7CdQSryhPe/IoYio/0nX8XFn0ZDX/ENqiUOuGLyuivKei8sI4SEWYCpszk
hfbSkSqcdnf3kKaqEZGbfUDmI/5Bo7oCGCewA3riDwZRKo1PgUnJuO3L8L0ZLsFc
mWgkevigvXoy1E6sXa1IGkAM3O8UuJjKmA/hXbKA50uDKogO9Pkb/9afWpSRgkfU
WUHUydqMMwUMgdEpDkr6YWUT3tf2HAiLkRhEs6w7jrs69Su4iMwOIjahUZGk8hcj
NCxX3uyWq+JoZsZSkloMriapX/W8qLYmuwMFnmEA/qd2XIZboXSpZS3AFWQ+o+ZN
z/rv9bWerlPAWLb+0EPu81xe3pmadkk8xmay9iphNn4aKf6aV8QGjCvuI1uv5VRi
MqbKJP0YjAQQdf0sj/ezXbkBEl8RYwSyaQ39UsCorgHnJnNLmwk2S5kODlcD5aj0
LkzkwOcHB5bTMlJONBljKnyjxBwJUx8138yg5dEUrZSR2gOj/dLXD4lJq4zro/Yp
U/17BLbC7cU=
=9YPf
-----END PGP SIGNATURE-----