what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000004.txt

VIGILANTE-2000004.txt
Posted Jul 19, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #4 - HP Jetdirect FTP service has a remote denial of service vulnerability affecting versions 8.20 and below. A long quote command causes the printer to crash, requiring a power cycle.

tags | exploit, remote, denial of service
SHA-256 | 1760e48ed7729a901d201f966befad75e524963895c62e5c4145172f6c551d13

VIGILANTE-2000004.txt

Change Mirror Download
HP Jetdirect - Invalid FTP Command DoS

Advisory Code: VIGILANTE-2000004

Release Date:
July 19, 2000

Systems Affected:
HP Jetdirect printers using firmware versions:
- G.08.04
- H.08.05
- G.08.20
- H.08.20
Older firmware versions, prior to G.08.20 and H.08.20, are probably
also vulnerable.

THE PROBLEM
If you connect to the ftp service on your HP printer and send it the
following string: quote AAAAAAAAAAA <cr>
The printer crashes. It may require that you turn the power off and
on again to get the printer to work again. The display will show an
error message similar to this: 86:0003 (the bit after the colon seems
to vary a bit, we've also gotten :0004, :000B)

Vendor Status:
"Thank you for contacting Hewlett-Packard's Customer Care Technical
Center.

A fix for this issue is being implemented in the next firmware revision
for HP JetDirect print servers. The release date for this firmware
revision is yet unknown. I assure you that the issue has been
acknowledged and will be fixed in the near future. I appreciate your
help in bringing this matter to our attention and your patience as we
work to correct the issue.

Once again, thank you for contacting Hewlett-Packard's Customer Care
Technical Center."

Fix:
Initially reported on the 25th of May this year. No fix available,
see vendor status. You can apply the following workaround until a fix
is released:

To disable FTP through telnet, type the following command sequence:
1. ftp-config: 0.
2. Press Quit.
To enable FTP, type the following command sequence:
1. ftp-config: 1.
2. quit.

For those who wish to disable FTP through SNMP, there is an SNMP
OID: .1.3.6.1.4.1.11.2.4.3.5.19.0
type: integer.
0: disables
1: enables
By default, it returns a "1" for enabled.

Vendor URL: http://www.hp.com
Product URL: http://www.pandi.hp.com/pandi-db/home_page.show

Copyright VIGILANTe 2000-07-15

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: info@vigilante.com
http://www.vigilante.com


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close