Think Peripherals Can't Compromise Your Security?

Date Added: Apr 2010
Format: PDF

By exploiting software vulnerabilities, Code Red also affected other devices running web servers, including some printers. These printers treated the attack as a document to be printed, but since they could not interpret the "Document," they were stuck, unable to print the legitimate jobs queued up behind Code Red. Detecting and correcting the problem was one more burden on network administrators, at a time when Code Red was already causing problems. Network attached peripherals are typically characterized as standalone devices that rely on network access to provide their intended services to users but are not part of the networking infrastructure itself.