exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000014.txt

VIGILANTE-2000014.txt
Posted Oct 11, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #14 - HP Jetdirect print servers have multiple vulnerabilities which have effects ranging from the service crashing to the printer initiating a firmware upgrade based on random garbage in the memory, and in some cases powercycling won't fix the crash. It requires a new firmware burn by eg. HP to restore the Jetdirect card. The FTP, Telnet, and LPD services contain buffer overflows, and spoofed malformed packets can crash the printer. Fix available here.

tags | exploit, overflow, spoof, vulnerability
SHA-256 | bdca6965e5cc27db16052ee9d2ed6315debed77a62a63aa071a0614cac33ff36

VIGILANTE-2000014.txt

Change Mirror Download
HP Jetdirect multiple DoS

Advisory Code: VIGILANTE-2000014

Release Date:
October 10, 2000

Systems Affected:
("x" means any valid firmware letter)
- Printers with HP JetDirect Firmware x.08.04
- Printers with HP JetDirect Firmware x.08.05
- Printers with HP JetDirect Firmware x.08.20
- Likely other versions as well

THE PROBLEMS
The firmware in the HP JetDirect card contain multiple vulnerabilities
that can have effects ranging from the service crashing to the printer
initiating a firmware upgrade based on random garbage in the memory,
and in the last case powercycling won't fix the crash. It requires a
new firmware burn by eg. HP to restore the Jetdirect card.

The FTP service, the TELNET service and the LPD service all contain
buffer handling problems. Furthermore, the JetDirect IP implementation
contains a vulnerability that will cause the printer to crash, if a
certain malformed packet is sent to the printer. This packet can be
spoofed.

Vendor Status:
The vendor was contacted on the 25th of August and the vulnerabilities
were verified by them on the 7th of September.

Fix:
The new firmware versions can be retrieved using the following URL:
http://www.hp.com/cposupport/networking/software/allhpjd3.exe.html


Vendor URL: http://www.hp.com
Product URL: http://www.pandi.hp.com/pandi-db/home_page.show

Copyright VIGILANTe 2000-08-25

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: isis@vigilante.com
http://www.vigilante.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close