Re: New HP Jetdirect SNMP password vulnerability when using Web JetAdmin

From: Sven Pechler (helpdeskat_private)
Date: Tue Mar 04 2003 - 02:24:03 PST

  • Next message: OpenPKG: "[OpenPKG-SA-2003.017] OpenPKG Security Advisory (file)"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <3E63BA9C.3000303at_private>
    
    Hello Geoff,
    
    Thank you for your reply.
    
    Some reactions on your statements:
    
    1. I've tested the SNMP 'set community name'.  None responded 
    to 'internal' after I changed it to something else. 
    You are right when you mean the SNMP 'GET community name', that one can't 
    be changed.
    
    2. I'm not suggesting to keep the Web Server (EWS) password empty, only 
    the 'Web Jetadmin (WJA) device password'. 
    But you are right with the newer JetDirect cards (610N and higher). In 
    those cards the 'Web Jetadmin device password' is equal to the EWS 
    password (and also equal to the telnet password).
    
    In the 'older' JetDirect cards (600N and older), the 'WJA device password' 
    has nothing to do with the EWS password (they can even be different). The 
    WJA device password is just stored in a reserved place in the devices' 
    NVRAM and can only be used by the WJA.
    
    I have tested your suggesting by disabling the EWS (ews-config:0).  The 
    EWS shows now the message '404 not found'.  But when I place a device 
    password using WJA, the password is again readable in ASCII text using 
    SNMP.  So it won't help.
    
    And you are right about the raw ascii string; I made a typo in that one.
    
    Regards,
    University of Technology Eindhoven
    Faculty of Technology Management
    
    Sven Pechler
    
    ---------
    >Date: Mon, 03 Mar 2003 14:27:08 -0600
    >From: "snooperat_private" <snooperat_private>
    >To: Sven Pechler <helpdeskat_private>, bugtraqat_private
    >Subject: RE: New HP Jetdirect SNMP password vulnerability when using Web 
    JetAdmin
    >
    >Sven,
    >
    >I have been doing some research on the same issue, and it appears that 
    >some of the new firmware versions from HP actually fix this 
    >vulnerability by replacing the web server with a newer version that 
    >doesn't rely on client-side java to verify the password.
    [..snip..]
    



    This archive was generated by hypermail 2b30 : Tue Mar 04 2003 - 09:40:34 PST