COMMAND
HP JetDirect printers
SYSTEMS AFFECTED
HP JetDirect printers
PROBLEM
Joe Klemencic posted following. It seems that a byproduct of the
Code Red scans is also causing woes to HP JetDIrect printers,
causing them to print some diagnostics pages, then dropping off
the network. This is not from the actual Code Red .ida exploit
code or the shellcode, but from the NOPs instead. If you send a
HP JetDirect >4096 characters to the HTTP port, you will get the
same results as when the Code Red worm hits it.
Joe has tested against some HP JetDirect printers at various
firmware releases, and am unable to reproduce it after upgrading
the printers to firmware g08.32.
After upgrading, he has attempted to send all types of characters
and hex code up to 100000 characters at a time and was unable to
reproduce.
Vulnerability test:
1) Perform a continuous ping to the HP JetDirect Printer
2) Execute the overflow:
perl -e 'print "\x90"x4097;'|telnet <HP JetDirect Printer> 80
-OR-
perl -e 'print "<any character>"x4097;'|telnet <HP JetDirect Printer> 80
3) The ping should time out and the printer should print
diagnostic pages
4) To recover, power-cycle the printer, then flash the firmware
SOLUTION
Anything that can be flashed up to version g08.32 should no
longer be vulnerable.