Bugtraq mailing list archives

Re: vulnerabilities of postscript printers


From: Michael Zimmermann <zim () vegaa de>
Date: Sat, 24 Jan 2004 01:41:29 +0100

At Freitag, 23. Januar 2004 05:15 der Mouse wrote:
[about reading arbitray memory locaition with PostScript]
... such a thing is unnecessary for normal use

And it is not needed. All print jobs come in as PostScript-readable
files (program plus data) and the software on the printer
which reads and processes it is PostScript on the surface too,
hence at least data-stealing does not need reading or writing
of arbitrary port or memory locations.


[...] not all parallel interfaces are bidirectional in any
meaningful sense [...]

But the parallel interface of the PostScript printer probably is.
Hence it can be used to get data back to the intruder machine.
Or with the modern network interfaces the data exchange
goes over a normal (bidirectional) tcp/ip connection.


it needs to provide the correct value for a 32-bit "password".
(Such things can be set insecurely, certainly, but that's no 
different, really, from having a Unix box with root's password 
set to "root": it's admin error.)

Reminding colleagues of possible admin errors is not too
far fetched. Especially as the default setup is probably
with the "password" == 0 after each powerloss. Just stumbling
over the powercord in the evening -- oops, sorry --
pushing it back into the socket while my PC is waiting to
installing my own system-software which mimickes the 
normal one. Who would recognize anything for years?


Of course, implementation bugs are possible, as with anything.  But
exploiting such a thing isn't using PostScript per se.

Come on, der Mouse, according to this logic every Linux exploit 
which is discussed in Bugtraq is "not Linux per se".
And regarding PostScript security it may as well be 
more a design bug than an implementation flaw.

Let's not forget, that PostScript is for high-level printers
what Windows is for PCs. Nearly all PS printers run the
Adobe system, don't they? A mono-culture par excellance.


Well, I have a PostScript printer, and its biggest problem I know of is
that it has, as far as I can tell, no security on whom it will accept
jobs from, so I have to keep it on the non-routable house subnet.  (I
also leave it turned off most of the time.)

In your case the printer is only part of one network, der Mouse.
That is you achieve security by positioning it behind a firewall 
(or switch it off alltogether).
But the original question assumed a printer connected to two
different networks. And it was asked, wether one could misuse
the printer to access the other network or steal print-jobs.

Also you seem to have physical access to the machine.
What about a printer which is sitting in the copy-room
on the third floor and running day in and day out?

Your case and your arguments are indirect proof for the 
insecurity of the PostScript-printer situation.


Regards
-- 
Michael Zimmermann (Vegaa Safety and Security for Internet Services)



Current thread: