[20489] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Tektronix (Xerox) PhaserLink 850 Webserver Vulnerability (NEW

daemon@ATHENA.MIT.EDU (Francis Favorini)
Fri Apr 27 20:18:26 2001

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-ID:  <E525222439A3D111B5F600609712CBED197629@broca.biac.duke.edu>
Date:         Fri, 27 Apr 2001 13:08:49 -0400
Reply-To: Francis Favorini <francis.favorini@DUKE.EDU>
From: Francis Favorini <francis.favorini@DUKE.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM

From my testing:

Phaser 560
Tektronix Version:  1.01/21	
	Didn't find any variants that worked.

Phaser 740
Firmware Version:  1.24 / 4.08 / 21 / 8.62
	http://printername/ncl_subjects.html works

Phaser 750DP
	Firmware Version
		PostScript: 5.62
		VxWorks: 2.28
		Network: 11.100.11.15.1999
		Engine: 10
	http://printername/_ncl_subjects.shtml works

In both 740 and 750 the password is exposed in plain text for anyone to see.

I suggest not setting a default gateway for the printer's IP configuration.
This should limit the vulnerability to your own subnet.

-Francis

home help back first fref pref prev next nref lref last post