what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SRT2003-11-02-0115.txt

SRT2003-11-02-0115.txt
Posted Nov 4, 2003
Authored by Kevin Finisterre

Secure Network Operations, Inc. Advisory SRT2003-11-02-0115 - The NIPRint LPD-LPR Print Server versions 4.10 and below on the Win32 platform are susceptible to a buffer overflow that can allow a remote user to gain SYSTEM privileges. http://www.secnetops.com.

tags | advisory, remote, web, overflow
systems | windows
SHA-256 | fb70af3656c58520746abf065985b71d5adb36f13e3adc0125088d0ea0640f8c

SRT2003-11-02-0115.txt

Change Mirror Download
Secure Network Operations, Inc.             http://www.secnetops.com/research
Strategic Reconnaissance Team research@secnetops.com
Team Lead Contact kf@secnetops.com


Our Mission:
************************************************************************
Secure Network Operations offers expertise in Networking, Intrusion
Detection Systems (IDS), Software Security Validation, and
Corporate/Private Network Security. Our mission is to facilitate a
secure and reliable Internet and inter-enterprise communications
infrastructure through the products and services we offer.

To learn more about our company, products and services or to request a demo
of ANVIL FCS please visit our site at http://www.secnetops.com, or call us
at: 978-263-3829


Quick Summary:
************************************************************************
Advisory Number : SRT2003-11-02-0115
Product : NIPrint LPD-LPR Print Server
Version : <= 4.10
Vendor : http://www.networkinstruments.com/
Class : Remote
Criticality : High (to NIPrint users)
Operating System(s) : Win32


Notice
************************************************************************
The full technical details of this vulnerability can be found at:
http://www.secnetops.com under the research section.


Basic Explanation
************************************************************************
High Level Description : NIPrint contains a remote buffer overflow
What to do : Disable NIPrint until vendor patch is available.


Basic Technical Details
************************************************************************
Proof Of Concept Status : SNO has working Poc code.

Low Level Description : NIPrint suffers from a classic buffer overflow
condition. Sending 60 bytes to the printer port (515) will cause an
exploitable overflow in the NIPrint daemon. See our research page at
http://www.secnetops.biz/research for further details.


Vendor Status : Vendor was contacted via email. The issue was
confirmed however no further communication occured. We reccomend that you
disable NIPrint until a vendor patch is available.

Bugtraq URL : to be assigned

Disclaimer
------------------------------------------------------------------------
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories but can be obtained under contract.. Contact our sales
department at sales@secnetops.com for further information on how to
obtain proof of concept code.


------------------------------------------------------------------------
Secure Network Operations, Inc. || http://www.secnetops.com
"Embracing the future of technology, protecting you."



Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close