-- kim0 <[EMAIL PROTECTED]> Phenoelit (http://www.phenoelit.de) 90C0 969C EC71 01DC 36A0 FBEF 2D72 33C0 77FC CD42
Phenoelit Advisory <wir-haben-auch-mal-was-gefunden #0815 +-+>
[ Authors ] FX <[EMAIL PROTECTED]> kim0 <[EMAIL PROTECTED]> Phenoelit Group (http://www.phenoelit.de) Advisroy http://www.phenoelit.de/stuff/HP_snmp.txt [ Affected Products ] Hewlett Packard (HP) Printers HP Bug ID: Not assigned CERT Vulnerability ID: 377033 [ Vendor communication ] 06/29/02 Initial Notification, [EMAIL PROTECTED] *Note-Initial notification by phenoelit includes a cc to [EMAIL PROTECTED] by default 06/29/02 RBL blocked delivery to [EMAIL PROTECTED] 06/29/02 Creation of ho-mail account and resend (note, kim0 HATES ho-mail at this point) 07/01/02 Auto-responder reply 07/01/02 Human Contact, PGP exchange and ack. 07/19/02 Notification of intent to post publically in apx. 7 days. 07/23/02 Coordination for release date/times [ Overview ] HP Network-Enable Printers (JetDirect) [ Description ] SNMP variable accessible by SNMP READ exposes HTTP and TELNET administrative access password in HEX (.iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0) An SNMP read request to this variable will return a HEX string such as 0x01 0X15 0x41 0X41, where the numbers after the second byte represent the password in ASCII (in this case, the password is 'AA'). [ Example ] linux# snmpget <printer_ip> public .iso.3.6.1.4.1.11.2.3.9.4.2.1.3.9.1.1.0 [ Solution ] None known at this time. [ end of file ]