CVE-2001-1039
CVSS7.5
发布时间 :2001-08-31 00:00:00
修订时间 :2008-09-05 16:25:32
NMCOS    

[原文]The JetAdmin web interface for HP JetDirect does not set a password for the telnet interface when the admin password is changed, which allows remote attackers to gain access to the printer.


[CNNVD]HP JetDirect JetAdmin打印机口令漏洞(CNNVD-200108-181)

        CVE(CAN) ID: CAN-2001-1039
        
        
        
        HP JetDirect JetAdmin是HP商业打印服务器的安装、管理软件。
        
        
        
        HP JetDirect打印机可以通过JetAdmin web接口进行配置。用户可以为打印机设置一个管理
        
        口令。然而,通过web接口设置的口令对于telnet接口并没有起作用。如果用户没有手工为
        
        telnet接口也设置一个口令,攻击者仍然可以直接通过连接telnet接口来访问系统。
        
        
        
        另外,对于HP LaserJet 2100 TN ,如果系统重新启动,这个管理口令也会被重置会缺省值。
        
        
        
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:hp:jetadmin:4.0HP JetAdmin 4.0
cpe:/a:hp:jetadmin:5.6HP JetAdmin 5.6
cpe:/a:hp:jetadmin:6.2HP JetAdmin 6.2
cpe:/a:hp:jetadmin:6.0HP JetAdmin 6.0
cpe:/a:hp:jetadmin:5.5.177HP JetAdmin 5.5.177
cpe:/a:hp:jetadmin:5.5HP JetAdmin 5.5
cpe:/a:hp:jetadmin:5.1HP JetAdmin 5.1
cpe:/a:hp:jetadmin:6.1HP JetAdmin 6.1
cpe:/a:hp:jetadmin:4.1.2HP JetAdmin 4.1.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1039
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1039
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-181
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/3132
(VENDOR_ADVISORY)  BID  3132
http://www.securityfocus.com/archive/1/201160
(VENDOR_ADVISORY)  BUGTRAQ  20010801 HP Jetdirect passwords don't sync

- 漏洞信息

HP JetDirect JetAdmin打印机口令漏洞
高危 设计错误
2001-08-31 00:00:00 2005-10-20 00:00:00
远程  
        CVE(CAN) ID: CAN-2001-1039
        
        
        
        HP JetDirect JetAdmin是HP商业打印服务器的安装、管理软件。
        
        
        
        HP JetDirect打印机可以通过JetAdmin web接口进行配置。用户可以为打印机设置一个管理
        
        口令。然而,通过web接口设置的口令对于telnet接口并没有起作用。如果用户没有手工为
        
        telnet接口也设置一个口令,攻击者仍然可以直接通过连接telnet接口来访问系统。
        
        
        
        另外,对于HP LaserJet 2100 TN ,如果系统重新启动,这个管理口令也会被重置会缺省值。
        
        
        
        

- 公告与补丁

        
        
        临时解决方法:
        
        
        
        您应当立刻手工为telnet接口也设置一个口令。
        
        
        
        厂商补丁:
        
        
        
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商
        
        的主页以获取最新版本:
        
        
        http://www.hp.com/cposupport/nonjsnav/hpprinterm28673.html

        

- 漏洞信息

14821
HP JetDirect JetAdmin Telnet Interface Password Sync Issue

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-08-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

HP JetDirect JetAdmin Password Vulnerability
Design Error 3132
Yes No
2001-08-01 12:00:00 2009-07-11 07:56:00
This vulnerability was submitted to BugTraq on August 1st, 2001 by Will Backman <whb@ceimaine.org>.

- 受影响的程序版本

HP JetAdmin 6.2
HP JetAdmin 6.1
HP JetAdmin 6.0
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.20
- Linux kernel 2.2 .x
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Novell Netware 5.1
- Sun Solaris 8_sparc
HP JetAdmin 5.6
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.20
- Linux kernel 2.2 .x
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Novell Netware 5.1
- Sun Solaris 8_sparc
HP JetAdmin 5.5.177
- HP HP-UX 11.0 4
- HP HP-UX 11.0
- HP HP-UX 10.20
- Linux kernel 2.2 .x
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Novell Netware 5.1
- Sun Solaris 8_sparc
HP JetAdmin 5.5
HP JetAdmin 5.1
HP JetAdmin 4.1.2
HP JetAdmin 4.0

- 漏洞讨论

HP JetDirect JetAdmin is the installation and management software for HP's line of commercial print servers.

HP JetDirect devices configured using the JetAdmin web interface do not set a password for telnet access when the administrator password is chosen. As a result, the telnet port will be left exposed to unrestricted remote access. Remote users with malicious intent will be able to access the device to cause a denial of service, or potentially monitor printer activity to gather information that may be used to compromise systems.

Additionally, this problem is compounded by the fact that the admin password is reset when the device is rebooted.

- 漏洞利用

No exploit is required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站