[12613] in bugtraq

home help back first fref pref prev next nref lref last post

NEUROCOM: Nashuatec D445/435 vulnerabilities updated

daemon@ATHENA.MIT.EDU (gregory duchemin)
Wed Nov 17 12:14:06 1999

Message-Id:  <19991116182721.9004.qmail@securityfocus.com>
Date:         Tue, 16 Nov 1999 18:27:21 -0000
Reply-To: gregory duchemin <veille@NEUROCOM.COM>
From: gregory duchemin <veille@NEUROCOM.COM>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM


Hi,

my last message concerning three commons vulnerabilities on Nashuatec printers model D445 is also available for the D435 series.

These two models of printers are vulnerables to:

1- ftp bounce attack 
2- adm web server cgi buffer overflow ( eg: reset )
3- (icmp redirect storm) denial of service attack

now a little update (about the two series):

4- By default, a "guest" account (password guest) allow everybody to authenticate himself to the telnet service. That's not exactly what we should call a security hole since everybody can connect to the web server with exactly the same priviledge and without any needed authentication.

5- the telnetd daemon no longer listen on its port after only one syn stealth scan (try nmap "-sS" option).This behavior suggest that this version of telnetd is unable to manage simultaneous connection requests resulting in a possible denial of service attack.

Have a nice day



******************

Gregory Duchemin
Security & networks Engineer

Email: veille@securite-internet.com
http://www.securite-internet.com


home help back first fref pref prev next nref lref last post