Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah tbh it's not as bad as he claimed. I doubt this is actually rated 9.9:

>A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started (from that computer).

>WAN / public internet: a remote attacker sends an UDP packet to port 631. No authentication whatsoever.

>LAN: a local attacker can spoof zeroconf / mDNS / DNS-SD advertisements (we will talk more about this in the next writeup ) and achieve the same code path leading to RCE.

Still, sucks for linux desktop users. Looks like any random device on your wifi/vpn can screw you over



Or any malicious user on the airport wifi. The compromise will linger until however many weeks later when you decide to print something...


Keep in mind that you still need send a print job to the fake printer to trigger the exploit. If you send the job to your real printer, nothing happens.


The exploit allows an attacker to overwrite your real printer with their fake printer.


Not using the "WAN" attack if you are using a firewall config that stops that on public wifi.

I do not understand how the mDNS entry point works.


i knew there was a reason i blacklist unsolicited/unauthenticated UDP inbound.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: