Phenoelit Advisory #0815 +-+

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




-- 
            kim0   <kim0@phenoelit.de>
        Phenoelit (http://www.phenoelit.de)
90C0 969C EC71 01DC 36A0  FBEF 2D72 33C0 77FC CD42
Phenoelit Advisory <wir-haben-auch-mal-was-gefunden #0815 +-+>

[ Authors ]
	FX		<fx@phenoelit.de>
	kim0 		<kim0@phenoelit.de>	

	Phenoelit Group	(http://www.phenoelit.de)
	Advisroy	http://www.phenoelit.de/stuff/HP_snmp.txt

[ Affected Products ]
	Hewlett Packard (HP)  
			Printers

	HP Bug ID:	Not assigned
	CERT Vulnerability ID:	377033

[ Vendor communication ]
        06/29/02        Initial Notification, security-alert@hp.com
                        *Note-Initial notification by phenoelit
                        includes a cc to cert@cert.org by default
        06/29/02        RBL blocked delivery to security-alert@hp.com
        06/29/02        Creation of ho-mail account and resend
                        (note, kim0 HATES ho-mail at this point)
        07/01/02        Auto-responder reply
        07/01/02        Human Contact, PGP exchange and ack.
        07/19/02        Notification of intent to post publically
                        in apx. 7 days.
	07/23/02	Coordination for release date/times

[ Overview ]
	HP Network-Enable Printers (JetDirect)
	
[ Description ]
	SNMP variable accessible by SNMP READ exposes HTTP and TELNET 
	administrative access password in HEX 
	(.iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0)
	An SNMP read request to this variable will return a HEX string 
	such as	0x01 0X15 0x41 0X41, where the numbers after the second 
	byte represent the password in ASCII (in this case, the password is 'AA').

[ Example ]
	linux# snmpget <printer_ip> public .iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0

[ Solution ]
	None known at this time. 

[ end of file ]



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux