Vulnerabilites related to hp - 2dr21d
CVE-2019-10627 (GCVE-0-2019-10627)
Vulnerability from cvelistv5
Published
2019-11-21 14:38
Modified
2024-08-04 22:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters
Summary
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
References
▼ | URL | Tags |
---|---|---|
https://support.hp.com/us-en/document/c06458150 | x_refsource_MISC | |
https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | PostScript and PDF printers that use IPS versions prior to 2019.2 |
Version: PostScript and PDF printers that use IPS versions prior to 2019.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:31:59.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PostScript and PDF printers that use IPS versions prior to 2019.2", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "PostScript and PDF printers that use IPS versions prior to 2019.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T12:40:49", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2019-10627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PostScript and PDF printers that use IPS versions prior to 2019.2", "version": { "version_data": [ { "version_value": "PostScript and PDF printers that use IPS versions prior to 2019.2" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hp.com/us-en/document/c06458150", "refsource": "MISC", "url": "https://support.hp.com/us-en/document/c06458150" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2019-10627", "datePublished": "2019-11-21T14:38:22", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:31:59.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6337 (GCVE-0-2019-6337)
Vulnerability from cvelistv5
Published
2019-11-07 14:37
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Buffer Overflow, Disclosure of Information
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
References
▼ | URL | Tags |
---|---|---|
https://support.hp.com/us-en/document/c06458150 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series", "vendor": "n/a", "versions": [ { "status": "affected", "version": "001.1937C or later For all models" } ] } ], "descriptions": [ { "lang": "en", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow, Disclosure of Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T14:37:09", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2019-6337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series", "version": { "version_data": [ { "version_value": "001.1937C or later For all models" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow, Disclosure of Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hp.com/us-en/document/c06458150", "refsource": "MISC", "url": "https://support.hp.com/us-en/document/c06458150" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2019-6337", "datePublished": "2019-11-07T14:37:09", "dateReserved": "2019-01-15T00:00:00", "dateUpdated": "2024-08-04T20:16:24.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201911-0876
Vulnerability from variot
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device. HP Inkjet The printer contains a vulnerability with reachable assertions.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. HP Inkjet printers is an Inkjet series printer from Hewlett-Packard (HP).
There are security holes in HP Inkjet printers. The vulnerability originates from network system or product configuration errors during operation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-0876", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "d3q20c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "k9z76b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j3p68a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937c" }, { "model": "d3q19d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j6u55d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q15a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q21a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q15b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "t0g70a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937c" }, { "model": "w2z52b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q19b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j6u57a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "k9z74d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j9v78b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q16a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q19a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q16d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "k9z74a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "w2z53b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j6u55a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j6u51b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q21d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q20d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q20b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "k9z76d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q15d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j3p65a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937c" }, { "model": "d9l63a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937c" }, { "model": "j9v80b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d9l64a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937c" }, { "model": "k9z76a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q21c", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j6u57b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j9v82a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j9v80a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q20a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "2dr21d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q21b", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q17d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "j9v82d", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d3q17a", "scope": "lt", "trust": 1.0, "vendor": "hp", "version": "001.1937d" }, { "model": "d9l63a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "d9l64a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j3p65a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j3p68a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j6u55a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j6u57a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j6u57b", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j9v80a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "j9v80b", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "t0g70a", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "inkjet printers", "scope": null, "trust": 0.6, "vendor": "hp", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:hp:d9l63a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:d9l64a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j3p65a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j3p68a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j6u55a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j6u57a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j6u57b_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j9v80a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:j9v80b_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:t0g70a_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011831" } ] }, "cve": "CVE-2019-6337", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2019-6337", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CNVD-2019-43895", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2019-6337", "impactScore": 4.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.2, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6337", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6337", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6337", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-43895", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201911-393", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNNVD", "id": "CNNVD-201911-393" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device. HP Inkjet The printer contains a vulnerability with reachable assertions.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. HP Inkjet printers is an Inkjet series printer from Hewlett-Packard (HP). \n\nThere are security holes in HP Inkjet printers. The vulnerability originates from network system or product configuration errors during operation", "sources": [ { "db": "NVD", "id": "CVE-2019-6337" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNVD", "id": "CNVD-2019-43895" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6337", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-011831", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2019-43895", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-393", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNNVD", "id": "CNNVD-201911-393" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "id": "VAR-201911-0876", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" } ] }, "last_update_date": "2024-11-23T22:37:36.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "c06458150", "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06458150" }, { "title": "Patch for HP Inkjet printers Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/193101" }, { "title": "HP Inkjet printers Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=102510" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNNVD", "id": "CNNVD-201911-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-617", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://support.hp.com/us-en/document/c06458150" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6337" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6337" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNNVD", "id": "CNNVD-201911-393" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-43895" }, { "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "db": "CNNVD", "id": "CNNVD-201911-393" }, { "db": "NVD", "id": "CVE-2019-6337" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-04T00:00:00", "db": "CNVD", "id": "CNVD-2019-43895" }, { "date": "2019-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "date": "2019-11-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-393" }, { "date": "2019-11-07T15:15:11.070000", "db": "NVD", "id": "CVE-2019-6337" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-05T00:00:00", "db": "CNVD", "id": "CNVD-2019-43895" }, { "date": "2019-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011831" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-393" }, { "date": "2024-11-21T04:46:26.230000", "db": "NVD", "id": "CVE-2019-6337" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP Inkjet Printer reachable assertion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011831" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-393" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Published
2019-11-07 15:15
Modified
2024-11-21 04:46
Severity ?
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
References
▼ | URL | Tags | |
---|---|---|---|
hp-security-alert@hp.com | https://support.hp.com/us-en/document/c06458150 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hp.com/us-en/document/c06458150 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "352A01F4-786C-47F3-91CD-C291F30322DC", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70003792-C31A-413D-A797-1ECD47DB40F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1A3011-D519-4D84-BACC-7288F4D66EE3", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "579CB9CB-AA44-4761-BB9A-F17648F08810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0AA3854-7704-44FD-A5CA-4DD321B8093F", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2DE16-2E4D-4111-958C-611F1F8DA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3EFA6-C349-4088-9C9B-95DB9E812D74", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C09B23-4574-4560-8676-C294D0205C71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD58EBB2-6F62-45C9-9F03-A4E7C87BA323", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E896D6C-B17C-4C7A-BE2C-E1235515B49F", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB02B60-DA6C-4775-8D73-389E30961432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7532069E-32F1-497E-8526-CDD79DA1CA8D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4662B538-C208-458F-B64A-0877726371AF", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB2B7993-1C87-4305-BFF9-98639CECBD3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB2BBE2-2821-4994-8FA5-29298C6217D6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1600E28F-767B-4495-8063-A66984484C94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18ADF400-A200-428B-80FD-17E82137B54E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "matchCriteriaId": "03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AE134F-52B0-474F-9BA6-5C125470DCC4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB1F70D-EB33-497F-BC18-C197FAACAAD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "615ECDA7-2DFB-413F-BF21-077A4479CC1D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C32078-2873-4B07-B218-DF2937C8E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E206228B-8CD0-482F-9A83-FD400D8D65ED", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1184E875-E054-4D88-BBD8-93237C24B371", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B78A6D-FDAC-4BA6-8A4B-611673ADCD39", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625F93D-5E73-4AAD-99A3-8AC2AAAE0612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE1A5C31-C198-45EB-A87F-A37C520DA520", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8C5DC9-7082-4732-AF3F-599E595185D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E32A214-2672-4588-A72B-A0257C1C24F0", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3406B9CC-8FC0-4283-9601-3D93CE246150", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA6A88E-B1ED-40EC-898E-490D803E1273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63BD439C-1171-4A77-9832-A54A8319D3F6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13CD5BBA-91BC-42E8-B05D-113D7C01CEB7", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C0155AB-8D9E-4822-86B1-6702FD3A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586EFF40-D20C-4E65-A86D-7BFD69F26E44", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B215E8-D636-418C-AB0C-3F23F36B37D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71544467-64C7-4AB3-A94A-18A2F1EC268B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "matchCriteriaId": "54254FBD-2197-4A39-9BD0-1D51C711046C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCF860C-2FA3-42B1-8039-1D0B49157BA1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DCA80B-8127-4011-B185-F14EAB8B89EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F181AF0B-B2BD-4781-9314-FD5E05D1A7DC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A43BA0-2C47-4A57-BBE6-9A57ABB37212", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765254C9-5A71-4E13-9288-7EB3AE8A47FD", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "matchCriteriaId": "61942DC4-E95F-4A0F-95B1-304CEE7B569C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86C3B42B-76A8-48A3-A836-8DB3F5F33D83", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96E5227-0B40-493A-BC97-0944A88A3C52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2A84C2-DA6E-4C0A-86D4-185452936C66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1EA4FC-8226-459C-A2C6-CD5370C40D09", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC594695-B974-447F-8430-2928DE7D4C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*", "matchCriteriaId": "34897D9B-C0AF-4411-85C7-586ED2C72218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "932C298B-9160-43D2-9E76-A943526F40AB", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F64BDFC-D848-462C-84C4-0417622B0DEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7840467A-7605-4CE5-B3EB-45F6D54CF74C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D110EEE-2A44-4BC5-90DB-C3D146EF08D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FEE20CA-EFE3-492C-BA2E-9C117F02D458", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "491B07B3-E286-4046-98F1-D8BEFA526C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5F22175-7EC3-41BE-B642-A333E0245A40", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*", "matchCriteriaId": "02206B82-E599-4B35-A60C-CA98A137B008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F049DA70-73C6-4CB3-B744-4327F11ADF6B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0541BF3-4A4B-424F-AC23-7026C7E35AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65AD0E29-057D-4E7C-80C2-D7A40401799E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37BF997F-772A-4D06-8404-21F6E1CD10F4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "matchCriteriaId": "491BE10D-F37A-4FF7-8789-D0BA442F1E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C5A28B-89C0-469A-BA77-C1B85CE5D711", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE3072-B57E-4CEB-A0C7-C4B87B194C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "098D018F-A8BC-4FED-8AA4-9D032E9B3E8C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C143BDCE-586F-479E-BC8E-385F3FA4FC0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA79564-DF22-42A0-AA2A-8D1E90C719BC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CB96063-CC55-4EA7-87E5-34A68322E7F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." }, { "lang": "es", "value": "Para las impresoras listadas, un archivo de impresi\u00f3n dise\u00f1ado con fines maliciosos puede causar que determinadas impresoras HP Inkjet se confirmen. Bajo ciertas circunstancias, la impresora produce un volcado de n\u00facleo en un dispositivo local." } ], "id": "CVE-2019-6337", "lastModified": "2024-11-21T04:46:26.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-07T15:15:11.070", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-21 15:15
Modified
2024-11-21 04:19
Severity ?
Summary
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:ips:*:*:*:*:*:*:*:*", "matchCriteriaId": "A725A879-5C10-4ECC-94EA-5F7E764D62F0", "versionEndExcluding": "2019.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "352A01F4-786C-47F3-91CD-C291F30322DC", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70003792-C31A-413D-A797-1ECD47DB40F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1A3011-D519-4D84-BACC-7288F4D66EE3", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "579CB9CB-AA44-4761-BB9A-F17648F08810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0AA3854-7704-44FD-A5CA-4DD321B8093F", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2DE16-2E4D-4111-958C-611F1F8DA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3EFA6-C349-4088-9C9B-95DB9E812D74", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C09B23-4574-4560-8676-C294D0205C71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD58EBB2-6F62-45C9-9F03-A4E7C87BA323", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E896D6C-B17C-4C7A-BE2C-E1235515B49F", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB02B60-DA6C-4775-8D73-389E30961432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7532069E-32F1-497E-8526-CDD79DA1CA8D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4662B538-C208-458F-B64A-0877726371AF", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB2B7993-1C87-4305-BFF9-98639CECBD3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB2BBE2-2821-4994-8FA5-29298C6217D6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1600E28F-767B-4495-8063-A66984484C94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18ADF400-A200-428B-80FD-17E82137B54E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "matchCriteriaId": "03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AE134F-52B0-474F-9BA6-5C125470DCC4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB1F70D-EB33-497F-BC18-C197FAACAAD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "615ECDA7-2DFB-413F-BF21-077A4479CC1D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C32078-2873-4B07-B218-DF2937C8E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E206228B-8CD0-482F-9A83-FD400D8D65ED", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1184E875-E054-4D88-BBD8-93237C24B371", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B78A6D-FDAC-4BA6-8A4B-611673ADCD39", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625F93D-5E73-4AAD-99A3-8AC2AAAE0612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE1A5C31-C198-45EB-A87F-A37C520DA520", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8C5DC9-7082-4732-AF3F-599E595185D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E32A214-2672-4588-A72B-A0257C1C24F0", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3406B9CC-8FC0-4283-9601-3D93CE246150", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA6A88E-B1ED-40EC-898E-490D803E1273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63BD439C-1171-4A77-9832-A54A8319D3F6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13CD5BBA-91BC-42E8-B05D-113D7C01CEB7", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C0155AB-8D9E-4822-86B1-6702FD3A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586EFF40-D20C-4E65-A86D-7BFD69F26E44", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B215E8-D636-418C-AB0C-3F23F36B37D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71544467-64C7-4AB3-A94A-18A2F1EC268B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "matchCriteriaId": "54254FBD-2197-4A39-9BD0-1D51C711046C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCF860C-2FA3-42B1-8039-1D0B49157BA1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DCA80B-8127-4011-B185-F14EAB8B89EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F181AF0B-B2BD-4781-9314-FD5E05D1A7DC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A43BA0-2C47-4A57-BBE6-9A57ABB37212", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765254C9-5A71-4E13-9288-7EB3AE8A47FD", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "matchCriteriaId": "61942DC4-E95F-4A0F-95B1-304CEE7B569C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86C3B42B-76A8-48A3-A836-8DB3F5F33D83", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96E5227-0B40-493A-BC97-0944A88A3C52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2A84C2-DA6E-4C0A-86D4-185452936C66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1EA4FC-8226-459C-A2C6-CD5370C40D09", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC594695-B974-447F-8430-2928DE7D4C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*", "matchCriteriaId": "34897D9B-C0AF-4411-85C7-586ED2C72218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "932C298B-9160-43D2-9E76-A943526F40AB", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F64BDFC-D848-462C-84C4-0417622B0DEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7840467A-7605-4CE5-B3EB-45F6D54CF74C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D110EEE-2A44-4BC5-90DB-C3D146EF08D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FEE20CA-EFE3-492C-BA2E-9C117F02D458", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "491B07B3-E286-4046-98F1-D8BEFA526C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5F22175-7EC3-41BE-B642-A333E0245A40", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*", "matchCriteriaId": "02206B82-E599-4B35-A60C-CA98A137B008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F049DA70-73C6-4CB3-B744-4327F11ADF6B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0541BF3-4A4B-424F-AC23-7026C7E35AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65AD0E29-057D-4E7C-80C2-D7A40401799E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37BF997F-772A-4D06-8404-21F6E1CD10F4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "matchCriteriaId": "491BE10D-F37A-4FF7-8789-D0BA442F1E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C5A28B-89C0-469A-BA77-C1B85CE5D711", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE3072-B57E-4CEB-A0C7-C4B87B194C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "098D018F-A8BC-4FED-8AA4-9D032E9B3E8C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C143BDCE-586F-479E-BC8E-385F3FA4FC0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA79564-DF22-42A0-AA2A-8D1E90C719BC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CB96063-CC55-4EA7-87E5-34A68322E7F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" }, { "lang": "es", "value": "Vulnerabilidad de desbordamiento de enteros para un desbordamiento de b\u00fafer en el c\u00f3digo de manejo de im\u00e1genes PostScript usado por los int\u00e9rpretes compatibles con PostScript y PDF debido a un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer. En impresoras PostScript y PDF que usan IPS versiones anteriores a 2019.2 y en impresoras PostScript y PDF que usan IPS versiones anteriores a 2019.2." } ], "id": "CVE-2019-10627", "lastModified": "2024-11-21T04:19:37.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-21T15:15:13.760", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-131" }, { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }