Vulnerabilites related to hp - 2dr21d_firmware
CVE-2019-10627 (GCVE-0-2019-10627)
Vulnerability from cvelistv5
Published
2019-11-21 14:38
Modified
2024-08-04 22:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters
Summary
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
References
▼ | URL | Tags |
---|---|---|
https://support.hp.com/us-en/document/c06458150 | x_refsource_MISC | |
https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | PostScript and PDF printers that use IPS versions prior to 2019.2 |
Version: PostScript and PDF printers that use IPS versions prior to 2019.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:31:59.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PostScript and PDF printers that use IPS versions prior to 2019.2", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "PostScript and PDF printers that use IPS versions prior to 2019.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T12:40:49", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2019-10627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PostScript and PDF printers that use IPS versions prior to 2019.2", "version": { "version_data": [ { "version_value": "PostScript and PDF printers that use IPS versions prior to 2019.2" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability in the PostScript- and PDF-compatible interpreters" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hp.com/us-en/document/c06458150", "refsource": "MISC", "url": "https://support.hp.com/us-en/document/c06458150" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2019-10627", "datePublished": "2019-11-21T14:38:22", "dateReserved": "2019-03-29T00:00:00", "dateUpdated": "2024-08-04T22:31:59.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6337 (GCVE-0-2019-6337)
Vulnerability from cvelistv5
Published
2019-11-07 14:37
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Buffer Overflow, Disclosure of Information
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
References
▼ | URL | Tags |
---|---|---|
https://support.hp.com/us-en/document/c06458150 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series", "vendor": "n/a", "versions": [ { "status": "affected", "version": "001.1937C or later For all models" } ] } ], "descriptions": [ { "lang": "en", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow, Disclosure of Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T14:37:09", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2019-6337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HP OfficeJet Pro 8210 Printer series,HP PageWide 352dw Printer,HP PageWide 377dw Multifunction Printer,HP PageWide Managed P55250dw Printer series,HP PageWide Managed P57750dw Multifunction Printer series,HP PageWide Managed P52750dw Multifunction Printer,HP PageWide Pro 452dn Printer series,HP PageWide Pro 452dw Printer series,HP PageWide Pro 477dn Multifunction Printer series,HP PageWide Pro 477dw Multifunction Printer series,HP PageWide Pro 552dw Printer series,HP PageWide Pro 577dw Multifunction Printer series", "version": { "version_data": [ { "version_value": "001.1937C or later For all models" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow, Disclosure of Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.hp.com/us-en/document/c06458150", "refsource": "MISC", "url": "https://support.hp.com/us-en/document/c06458150" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2019-6337", "datePublished": "2019-11-07T14:37:09", "dateReserved": "2019-01-15T00:00:00", "dateUpdated": "2024-08-04T20:16:24.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-11-21 15:15
Modified
2024-11-21 04:19
Severity ?
Summary
Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qualcomm:ips:*:*:*:*:*:*:*:*", "matchCriteriaId": "A725A879-5C10-4ECC-94EA-5F7E764D62F0", "versionEndExcluding": "2019.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "352A01F4-786C-47F3-91CD-C291F30322DC", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70003792-C31A-413D-A797-1ECD47DB40F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1A3011-D519-4D84-BACC-7288F4D66EE3", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "579CB9CB-AA44-4761-BB9A-F17648F08810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0AA3854-7704-44FD-A5CA-4DD321B8093F", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2DE16-2E4D-4111-958C-611F1F8DA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3EFA6-C349-4088-9C9B-95DB9E812D74", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C09B23-4574-4560-8676-C294D0205C71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD58EBB2-6F62-45C9-9F03-A4E7C87BA323", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E896D6C-B17C-4C7A-BE2C-E1235515B49F", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB02B60-DA6C-4775-8D73-389E30961432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7532069E-32F1-497E-8526-CDD79DA1CA8D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4662B538-C208-458F-B64A-0877726371AF", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB2B7993-1C87-4305-BFF9-98639CECBD3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB2BBE2-2821-4994-8FA5-29298C6217D6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1600E28F-767B-4495-8063-A66984484C94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18ADF400-A200-428B-80FD-17E82137B54E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "matchCriteriaId": "03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AE134F-52B0-474F-9BA6-5C125470DCC4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB1F70D-EB33-497F-BC18-C197FAACAAD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "615ECDA7-2DFB-413F-BF21-077A4479CC1D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C32078-2873-4B07-B218-DF2937C8E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E206228B-8CD0-482F-9A83-FD400D8D65ED", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1184E875-E054-4D88-BBD8-93237C24B371", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B78A6D-FDAC-4BA6-8A4B-611673ADCD39", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625F93D-5E73-4AAD-99A3-8AC2AAAE0612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE1A5C31-C198-45EB-A87F-A37C520DA520", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8C5DC9-7082-4732-AF3F-599E595185D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E32A214-2672-4588-A72B-A0257C1C24F0", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3406B9CC-8FC0-4283-9601-3D93CE246150", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA6A88E-B1ED-40EC-898E-490D803E1273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63BD439C-1171-4A77-9832-A54A8319D3F6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13CD5BBA-91BC-42E8-B05D-113D7C01CEB7", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C0155AB-8D9E-4822-86B1-6702FD3A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586EFF40-D20C-4E65-A86D-7BFD69F26E44", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B215E8-D636-418C-AB0C-3F23F36B37D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71544467-64C7-4AB3-A94A-18A2F1EC268B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "matchCriteriaId": "54254FBD-2197-4A39-9BD0-1D51C711046C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCF860C-2FA3-42B1-8039-1D0B49157BA1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DCA80B-8127-4011-B185-F14EAB8B89EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F181AF0B-B2BD-4781-9314-FD5E05D1A7DC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A43BA0-2C47-4A57-BBE6-9A57ABB37212", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765254C9-5A71-4E13-9288-7EB3AE8A47FD", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "matchCriteriaId": "61942DC4-E95F-4A0F-95B1-304CEE7B569C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86C3B42B-76A8-48A3-A836-8DB3F5F33D83", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96E5227-0B40-493A-BC97-0944A88A3C52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2A84C2-DA6E-4C0A-86D4-185452936C66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1EA4FC-8226-459C-A2C6-CD5370C40D09", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC594695-B974-447F-8430-2928DE7D4C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*", "matchCriteriaId": "34897D9B-C0AF-4411-85C7-586ED2C72218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "932C298B-9160-43D2-9E76-A943526F40AB", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F64BDFC-D848-462C-84C4-0417622B0DEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7840467A-7605-4CE5-B3EB-45F6D54CF74C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D110EEE-2A44-4BC5-90DB-C3D146EF08D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FEE20CA-EFE3-492C-BA2E-9C117F02D458", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "491B07B3-E286-4046-98F1-D8BEFA526C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5F22175-7EC3-41BE-B642-A333E0245A40", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*", "matchCriteriaId": "02206B82-E599-4B35-A60C-CA98A137B008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F049DA70-73C6-4CB3-B744-4327F11ADF6B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0541BF3-4A4B-424F-AC23-7026C7E35AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65AD0E29-057D-4E7C-80C2-D7A40401799E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37BF997F-772A-4D06-8404-21F6E1CD10F4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "matchCriteriaId": "491BE10D-F37A-4FF7-8789-D0BA442F1E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C5A28B-89C0-469A-BA77-C1B85CE5D711", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE3072-B57E-4CEB-A0C7-C4B87B194C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "098D018F-A8BC-4FED-8AA4-9D032E9B3E8C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C143BDCE-586F-479E-BC8E-385F3FA4FC0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA79564-DF22-42A0-AA2A-8D1E90C719BC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CB96063-CC55-4EA7-87E5-34A68322E7F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2" }, { "lang": "es", "value": "Vulnerabilidad de desbordamiento de enteros para un desbordamiento de b\u00fafer en el c\u00f3digo de manejo de im\u00e1genes PostScript usado por los int\u00e9rpretes compatibles con PostScript y PDF debido a un c\u00e1lculo incorrecto del tama\u00f1o del b\u00fafer. En impresoras PostScript y PDF que usan IPS versiones anteriores a 2019.2 y en impresoras PostScript y PDF que usan IPS versiones anteriores a 2019.2." } ], "id": "CVE-2019-10627", "lastModified": "2024-11-21T04:19:37.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-21T15:15:13.760", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-131" }, { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-07 15:15
Modified
2024-11-21 04:46
Severity ?
Summary
For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.
References
▼ | URL | Tags | |
---|---|---|---|
hp-security-alert@hp.com | https://support.hp.com/us-en/document/c06458150 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hp.com/us-en/document/c06458150 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "352A01F4-786C-47F3-91CD-C291F30322DC", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70003792-C31A-413D-A797-1ECD47DB40F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1A3011-D519-4D84-BACC-7288F4D66EE3", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*", "matchCriteriaId": "579CB9CB-AA44-4761-BB9A-F17648F08810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0AA3854-7704-44FD-A5CA-4DD321B8093F", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2DE16-2E4D-4111-958C-611F1F8DA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3EFA6-C349-4088-9C9B-95DB9E812D74", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4C09B23-4574-4560-8676-C294D0205C71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD58EBB2-6F62-45C9-9F03-A4E7C87BA323", "versionEndExcluding": "001.1937c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AC3438C-2004-4F7A-990E-7BF9AEEFBC4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E896D6C-B17C-4C7A-BE2C-E1235515B49F", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91F67235-1DE9-47F9-9A3A-AE2F6DB1A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3FC64B9-4F4F-4EAA-9F58-E910D95BBF54", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB02B60-DA6C-4775-8D73-389E30961432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7532069E-32F1-497E-8526-CDD79DA1CA8D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26E4A0-0CA3-4A2B-A2C1-9E6866FCD6AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4662B538-C208-458F-B64A-0877726371AF", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB2B7993-1C87-4305-BFF9-98639CECBD3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFB2BBE2-2821-4994-8FA5-29298C6217D6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1600E28F-767B-4495-8063-A66984484C94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18ADF400-A200-428B-80FD-17E82137B54E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*", "matchCriteriaId": "03DDBE01-B5D4-4FA4-9A90-234FAE9DC6D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AE134F-52B0-474F-9BA6-5C125470DCC4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB1F70D-EB33-497F-BC18-C197FAACAAD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "615ECDA7-2DFB-413F-BF21-077A4479CC1D", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C32078-2873-4B07-B218-DF2937C8E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E206228B-8CD0-482F-9A83-FD400D8D65ED", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1184E875-E054-4D88-BBD8-93237C24B371", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69B78A6D-FDAC-4BA6-8A4B-611673ADCD39", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7625F93D-5E73-4AAD-99A3-8AC2AAAE0612", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE1A5C31-C198-45EB-A87F-A37C520DA520", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D8C5DC9-7082-4732-AF3F-599E595185D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E32A214-2672-4588-A72B-A0257C1C24F0", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C048F3-0EA5-4C7E-BCD4-8A6E6F9F218B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3406B9CC-8FC0-4283-9601-3D93CE246150", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BA6A88E-B1ED-40EC-898E-490D803E1273", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63BD439C-1171-4A77-9832-A54A8319D3F6", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC8056-DE49-4FE0-8BE0-EB4E22C03AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13CD5BBA-91BC-42E8-B05D-113D7C01CEB7", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C0155AB-8D9E-4822-86B1-6702FD3A1F21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586EFF40-D20C-4E65-A86D-7BFD69F26E44", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B215E8-D636-418C-AB0C-3F23F36B37D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71544467-64C7-4AB3-A94A-18A2F1EC268B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*", "matchCriteriaId": "54254FBD-2197-4A39-9BD0-1D51C711046C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCF860C-2FA3-42B1-8039-1D0B49157BA1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DCA80B-8127-4011-B185-F14EAB8B89EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F181AF0B-B2BD-4781-9314-FD5E05D1A7DC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A43BA0-2C47-4A57-BBE6-9A57ABB37212", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "765254C9-5A71-4E13-9288-7EB3AE8A47FD", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*", "matchCriteriaId": "61942DC4-E95F-4A0F-95B1-304CEE7B569C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86C3B42B-76A8-48A3-A836-8DB3F5F33D83", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A96E5227-0B40-493A-BC97-0944A88A3C52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5539CA-CEDD-44D3-92F1-F2DA8F5B81CA", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2A84C2-DA6E-4C0A-86D4-185452936C66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1EA4FC-8226-459C-A2C6-CD5370C40D09", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC594695-B974-447F-8430-2928DE7D4C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59ED22B3-4716-40FB-9C52-F2D2AF3AC2C1", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*", "matchCriteriaId": "34897D9B-C0AF-4411-85C7-586ED2C72218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "932C298B-9160-43D2-9E76-A943526F40AB", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F64BDFC-D848-462C-84C4-0417622B0DEB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7840467A-7605-4CE5-B3EB-45F6D54CF74C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6FBBEA7-14B6-4B35-8A72-08FB3DD8F93D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53CDE63-B3D0-4F3F-A656-24DCDCD2D04A", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D110EEE-2A44-4BC5-90DB-C3D146EF08D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FEE20CA-EFE3-492C-BA2E-9C117F02D458", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*", "matchCriteriaId": "491B07B3-E286-4046-98F1-D8BEFA526C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5F22175-7EC3-41BE-B642-A333E0245A40", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*", "matchCriteriaId": "02206B82-E599-4B35-A60C-CA98A137B008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F049DA70-73C6-4CB3-B744-4327F11ADF6B", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0541BF3-4A4B-424F-AC23-7026C7E35AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65AD0E29-057D-4E7C-80C2-D7A40401799E", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4CFA09F-2CA1-4AD3-8F2E-BB7160375D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37BF997F-772A-4D06-8404-21F6E1CD10F4", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*", "matchCriteriaId": "491BE10D-F37A-4FF7-8789-D0BA442F1E28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C5A28B-89C0-469A-BA77-C1B85CE5D711", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "35AE3072-B57E-4CEB-A0C7-C4B87B194C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A81C65F-3BC9-4FBD-BF10-6D52CAD99A20", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C5DD0B-4C8C-45DE-AEBA-6942CE4B6E93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "098D018F-A8BC-4FED-8AA4-9D032E9B3E8C", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*", "matchCriteriaId": "C143BDCE-586F-479E-BC8E-385F3FA4FC0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DA79564-DF22-42A0-AA2A-8D1E90C719BC", "versionEndExcluding": "001.1937d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CB96063-CC55-4EA7-87E5-34A68322E7F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "For the printers listed a maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device." }, { "lang": "es", "value": "Para las impresoras listadas, un archivo de impresi\u00f3n dise\u00f1ado con fines maliciosos puede causar que determinadas impresoras HP Inkjet se confirmen. Bajo ciertas circunstancias, la impresora produce un volcado de n\u00facleo en un dispositivo local." } ], "id": "CVE-2019-6337", "lastModified": "2024-11-21T04:46:26.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-07T15:15:11.070", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.hp.com/us-en/document/c06458150" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }