Aaron Weaver has made a discovery the world could probably do without. He's found a way to spam your printer from the internet.
By using a little-known capability found in most browsers, Weaver can make a web page launch a print job on just about any printer on a victim's network. The website could print annoying adverts on the printer and theoretically issue more dangerous commands, such as telling the printer to send a fax, format its hard drive or download new firmware.
Weaver, a Pennsylvania-based security manager in the financial industry, described what he calls "cross site printing" in a research paper published on Tuesday on the Ha.ckers.org website.
Weaver has launched the attack successfully with both the Internet Explorer and Firefox browsers. Because the attack works only on network printers, a printer plugged directly into a PC would not be vulnerable.
The attack is possible because most browsers can connect to the networking port used by most printers to look for new print jobs. So by using the browser as a stepping stone, attackers are able to connect with something they should never be able to reach: a printer on the local area network.
While nobody had previously demonstrated this particular hack, Weaver's research is based on two concepts that are well-known to web security researchers: cross-site scripting attacks and vulnerabilities in the way browsers handle the Internet Protocol. "There's no precedent for [this hack]," said Robert Hansen, CEO of web security consultancy SecTheory and owner of the Ha.ckers.org website. "But what he did was marry two different concepts we've been talking about for a long time."
And if hackers figure out a way to make printers send out information about their print jobs to the internet, Weaver's hack could have even more profound security implications, Hansen said.