lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030304102403.9176.qmail@www.securityfocus.com>
Date: 4 Mar 2003 10:24:03 -0000
From: Sven Pechler <helpdesk@...tue.nl>
To: bugtraq@...urityfocus.com
Subject: Re: New HP Jetdirect SNMP password vulnerability when using Web
    JetAdmin


In-Reply-To: <3E63BA9C.3000303@...x.rr.com>

Hello Geoff,

Thank you for your reply.

Some reactions on your statements:

1. I've tested the SNMP 'set community name'.  None responded 
to 'internal' after I changed it to something else. 
You are right when you mean the SNMP 'GET community name', that one can't 
be changed.

2. I'm not suggesting to keep the Web Server (EWS) password empty, only 
the 'Web Jetadmin (WJA) device password'. 
But you are right with the newer JetDirect cards (610N and higher). In 
those cards the 'Web Jetadmin device password' is equal to the EWS 
password (and also equal to the telnet password).

In the 'older' JetDirect cards (600N and older), the 'WJA device password' 
has nothing to do with the EWS password (they can even be different). The 
WJA device password is just stored in a reserved place in the devices' 
NVRAM and can only be used by the WJA.

I have tested your suggesting by disabling the EWS (ews-config:0).  The 
EWS shows now the message '404 not found'.  But when I place a device 
password using WJA, the password is again readable in ASCII text using 
SNMP.  So it won't help.

And you are right about the raw ascii string; I made a typo in that one.

Regards,
University of Technology Eindhoven
Faculty of Technology Management

Sven Pechler

---------
>Date: Mon, 03 Mar 2003 14:27:08 -0600
>From: "snooper@...x.rr.com" <snooper@...x.rr.com>
>To: Sven Pechler <helpdesk@...tue.nl>, bugtraq@...urityfocus.com
>Subject: RE: New HP Jetdirect SNMP password vulnerability when using Web 
JetAdmin
>
>Sven,
>
>I have been doing some research on the same issue, and it appears that 
>some of the new firmware versions from HP actually fix this 
>vulnerability by replacing the web server with a newer version that 
>doesn't rely on client-side java to verify the password.
[..snip..]


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ