[20489] in bugtraq
Re: Tektronix (Xerox) PhaserLink 850 Webserver Vulnerability (NEW
daemon@ATHENA.MIT.EDU (Francis Favorini)
Fri Apr 27 20:18:26 2001
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <E525222439A3D111B5F600609712CBED197629@broca.biac.duke.edu>
Date: Fri, 27 Apr 2001 13:08:49 -0400
Reply-To: Francis Favorini <francis.favorini@DUKE.EDU>
From: Francis Favorini <francis.favorini@DUKE.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
From my testing:
Phaser 560
Tektronix Version: 1.01/21
Didn't find any variants that worked.
Phaser 740
Firmware Version: 1.24 / 4.08 / 21 / 8.62
http://printername/ncl_subjects.html works
Phaser 750DP
Firmware Version
PostScript: 5.62
VxWorks: 2.28
Network: 11.100.11.15.1999
Engine: 10
http://printername/_ncl_subjects.shtml works
In both 740 and 750 the password is exposed in plain text for anyone to see.
I suggest not setting a default gateway for the printer's IP configuration.
This should limit the vulnerability to your own subnet.
-Francis