what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

lexmark.txt

lexmark.txt
Posted Feb 8, 2006
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware has discovered a high risk vulnerability in the Lexmark Printer Sharing service which could allow a remote, unauthenticated attacker to execute arbitrary code on a Lexmark printer user's computer system with Local System privileges. A workaround is included in the advisory.

tags | advisory, remote, arbitrary, local
SHA-256 | 17c2a0cb655fbe259348176d404b85e1491d9c102c09b66f0487118c56e74bbc

lexmark.txt

Change Mirror Download
Peter Winter-Smith of NGSSoftware has discovered a high risk vulnerability
in the Lexmark Printer Sharing service which could allow a remote,
unauthenticated attacker to execute arbitrary code on a Lexmark printer
user's computer system with Local System privileges.

There is no known official patch or workaround for this issue, as Lexmark
have proven unresponsive throughout the investigation and have failed
to provide us with a response to our queries on many occasions.

Communications between NGS and Lexmark to date are summed up in the
following time-line:

[28/09/2005] Initial email to support@lexmark.com
[28/09/2005] Automated reply from support@lexmark.com
[29/09/2005] Re-sent email to csupportuk@lexmark.co.uk .. No response
[03/10/2005] Mass mail to secure@lexmark.com, security@lexmark.com,
security-alert@lexmark.com, info@lexmark.com .. No response
[04/10/2005] First response from Lexmark's 'Task ID IE THIRD LEVEL
ESCALATIONS' thanking NGS for the email dated the 28th Sept.
asking for further details.
[04/10/2005] Details of the vulnerability provided to Lexmark .. No response
[11/10/2005] Follow-up email to Lexmark .. No response
[18/10/2005] Follow-up email to Lexmark .. No response
[24/10/2005] Follow-up email to Lexmark .. No response
[08/11/2005] Follow-up email to Lexmark .. No response
[30/12/2005] Follow-up email to Lexmark .. No response
[07/01/2006] Informing Lexmark of this advisory .. No response

>From our tests it seems that the following workaround will prevent the
vulnerability from being present by removing the vulnerable service so that
it cannot start. This should not prevent the printer from working in normal
operations, however if a user is depending on the Lexmark Printer Sharing
services for network printing this workaround may impact that level of
functionality.

NGS do not take any responsibility for the following information being
correct or for any of the results which may occur as a result of taking the
following actions.

Workaround:

1. Launch the Services console by taking the following actions:
- Click the 'Start' menu.
- Select 'Run'.
- In the 'Run' command text area type 'services.msc' and click 'Ok'.
2. Find and right click the 'LexBce Server' entry. From the right click menu
select the 'Stop' item. Confirm that you wish to stop the service and all
dependencies.
3. Open the '%systemroot%\system32' folder by taking the following actions:
- Click the 'Start' menu.
- Select 'Run'.
- In the 'Run' command text area type '%systemroot%\system32' and click
'Ok'.
4. Locate the file named 'LexPPS.EXE'. Right click this file and select
'Rename'. Enter a new name for the file, I recommend 'LexPPS.EXE.vuln'.
5. In the Services console, locate and right click the 'LexBce Server' and
select 'Start'.
6. In the Services console, locate and right click the 'Print Spooler' and
select 'Start'.

This disclosure was made in accordance with the NGS responsible disclosure
policy which can be viewed online at:

http://www.ngssoftware.com/disclosure.pdf

NGSSoftware will withhold technical details of this flaw for at least one
month. Full technical details will be published on or after the 7th March
2006.

NGSSoftware Insight Security Research
http://www.ngssoftware.com
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close