COMMAND
HP JetDirect module
SYSTEMS AFFECTED
Probably affects all HP printers with network support
PROBLEM
Tobias Haustein found following. He played with our network
printer (a HP LaserJet 4500) and -- boom -- it crashed. The HP
JetDirect J3111A module with firmware G.05.35 suffers from a
buffer overflow in it's internal web server. If you enter the
following URL in your web browser
http://my-printer's-ip/very-long-rubbish(256 bytes or so)
the printer prints a diagnostics page showing the contents of all
registers and the following 64 bytes of all memory addresses that
address registers point to.
Obviously it's a M680x0 CPU with 512 KB of RAM in our model, so
writing an exploit should be fairly easy. The nice point about
it is that most people wouldn't expect their printer to be
compromised -- and since there is no logging on the printer, you
can't easily be tracked down... It has been confirmed with
JetDirect 300x print server J3263A firmware H.06.00 too.
SOLUTION
HP JetDirects can have the web server turned off (a good idea)
and use remote syslog to log all connections to the printer. The
HP print server control software automaticly turns the web
configuration back on, so don't use that - physicly go up to the
printer and disable all services you don't need. If only one
could add in ip allow ranges... Not Vulnerable seem to be
Firmware Revision G.07.17. To disable port 80 use the command:
ews-config: 0
If you are using bootp/tftp to configure your printers, you can
specify an allowed IP range in /tftpboot/<printer-name>.cfg,
like:
xxx.yyy.zzz.0 255.255.255.0