Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   NIPrint Vendors:   Network Instruments, LLC
NIPrint Print Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1008087
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 3 2003
Impact:   Execution of arbitrary code via network, User access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 4.10 and prior versions
Description:   A vulnerability was reported in the NIPrint print server. A remote user can execute arbitrary code on the target system.

Secure Network Operations Strategic Reconnaissance Team reported that a remote user can send 53 bytes of specially crafted data to the printer port (TCP port 515) to trigger a buffer overflow and execute arbitrary code.

The vendor has reportedly been notified.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.

The author recommends that you disable the NIPrint daemon until a fix is available.

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  SRT2003-11-02-0115 - NIPrint LPD-LPR Remote overflow

Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

We are currently evaluating .pdf based advisory release... please let us 
know if you have any issues with the pdf listed below.

Full details on this issue can be found at:


Content-Type: text/plain;
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;

Secure Network Operations, Inc.   
Strategic Reconnaissance Team     
Team Lead Contact                 

Our Mission:
Secure Network Operations offers expertise in Networking, Intrusion 
Detection Systems (IDS), Software Security Validation, and 
Corporate/Private Network Security. Our mission is to facilitate a 
secure and reliable Internet and inter-enterprise communications 
infrastructure through the products and services we offer. 

To learn more about our company, products and services or to request a demo
of ANVIL FCS please visit our site at, or call us
at: 978-263-3829

Quick Summary:
Advisory Number         : SRT2003-11-02-0115
Product                 : NIPrint LPD-LPR Print Server
Version                 : <= 4.10
Vendor                  :
Class                   : Remote
Criticality             : High (to NIPrint users)
Operating System(s)     : Win32

The full technical details of this vulnerability can be found at: under the research section. 

Basic Explanation
High Level Description  : NIPrint contains a remote buffer overflow
What to do              : Disable NIPrint until vendor patch is available. 

Basic Technical Details
Proof Of Concept Status : SNO has working Poc code.

Low Level Description   : NIPrint suffers from a classic buffer overflow 
condition. Sending 60 bytes to the printer port (515) will cause an 
exploitable overflow in the NIPrint daemon. See our research page at for further details. 

Vendor Status           : Vendor was contacted via email. The issue was 
confirmed however no further communication occured. We reccomend that you 
disable NIPrint until a vendor patch is available.

Bugtraq URL             : to be assigned

This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories but can be obtained under contract.. Contact our sales 
department at for further information on how to 
obtain proof of concept code.

Secure Network Operations, Inc. ||
"Embracing the future of technology, protecting you."




Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC