Solved

NFS Improper UID & NFS Exported Share Read Access

Posted on 2016-11-02
7
24 Views
Last Modified: 2016-11-18
These 2 items show up on my vulnerability scan of my HP Laser Jet p3015

Can someone please explain them to me  and if they can be shut off
0
Comment
Question by:syarmush
  • 4
  • 3
7 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 41875644
What items?
0
 

Author Comment

by:syarmush
ID: 41877466
NFS Improper UID & NFS Exported Share Read Access
0
 
LVL 61

Expert Comment

by:gheist
ID: 41877597
Can you post them one per paragraph with full text of finding/test?
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:syarmush
ID: 41877897
The remote system is running an NFS server which is configured
in such a way that it allows unauthenticated users to manipulate
the file system using unverified credentials. This can be
accomplished by spoofing the user ID (UID) and group ID (GID)
values in NFS RPC call packets.
Impact:
An unauthenticated network-based attacker can leverage this
misconfiguration issue to access and modify sensitive files that
are present on the remote system with super user privileges. This
level of access typically results in a complete compromise of the
vulnerable system.
Solution: If the NFS service is not necessary or is not being used, disable
the service. Alternatively, if the service is relied on, the issue may
be resolved either by implementing an authentication scheme
0
 
LVL 61

Accepted Solution

by:
gheist earned 500 total points
ID: 41882834
Easiest would be to disable NFS server (telnet to IP of JetDirect, type 'help', and look for disabling NFS printing)
0
 

Author Comment

by:syarmush
ID: 41890574
what is NFS printing?
0
 
LVL 61

Expert Comment

by:gheist
ID: 41893382
Some non-standard HP protocol. Probably you upload text files and images and printer prints them...
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now