[17129] in bugtraq

home help back first fref pref prev next nref lref last post

VIGILANTE-2000014: HP Jetdirect multiple DoS

daemon@ATHENA.MIT.EDU (=?iso-8859-1?Q?Peter_Gr=FCndl?=)
Tue Oct 10 12:51:09 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <000201c032be$7005d7a0$3487a8c0@pg.internal.n-m.com>
Date:         Tue, 10 Oct 2000 15:31:46 +0200
Reply-To: prg@vigilante.com
From: =?iso-8859-1?Q?Peter_Gr=FCndl?= <prg@VIGILANTE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

HP Jetdirect multiple DoS

Advisory Code:   VIGILANTE-2000014

Release Date:
October 10, 2000

Systems Affected:
("x" means any valid firmware letter)
- Printers with HP JetDirect Firmware x.08.04
- Printers with HP JetDirect Firmware x.08.05
- Printers with HP JetDirect Firmware x.08.20
- Likely other versions as well

THE PROBLEMS
The firmware in the HP JetDirect card contain multiple vulnerabilities
that can have effects ranging from the service crashing to the printer
initiating a firmware upgrade based on random garbage in the memory,
and in the last case powercycling won't fix the crash. It requires a
new firmware burn by eg. HP to restore the Jetdirect card.

The FTP service, the TELNET service and the LPD service all contain
buffer handling problems. Furthermore, the JetDirect IP implementation
contains a vulnerability that will cause the printer to crash, if a
certain malformed packet is sent to the printer. This packet can be
spoofed.

Vendor Status:
The vendor was contacted on the 25th of August and the vulnerabilities
were verified by them on the 7th of September.

Fix:
The new firmware versions can be retrieved using the following URL:
http://www.hp.com/cposupport/networking/software/allhpjd3.exe.html


Vendor   URL: http://www.hp.com
Product  URL: http://www.pandi.hp.com/pandi-db/home_page.show

Copyright VIGILANTe 2000-08-25

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: isis@vigilante.com
http://www.vigilante.com

home help back first fref pref prev next nref lref last post