VAR-201108-0226

Vulnerability from variot - Updated: 2023-12-18 12:58

pysmb.py in system-config-printer 0.6.x and 0.7.x, as used in foomatic-gui and possibly other products, allows remote SMB servers to execute arbitrary commands via shell metacharacters in the (1) NetBIOS or (2) workgroup name, which are not properly handled when searching for network printers. The 'system-config-printer' package is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to execute arbitrary code with the privileges of the user running the affected application. Successful exploits may aid in the compromise of affected computers. A vulnerability exists in pysmb.py of system-config-printer. ----------------------------------------------------------------------

The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242


TITLE: Red Hat update for system-config-printer

SECUNIA ADVISORY ID: SA45744

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45744/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45744

RELEASE DATE: 2011-08-25

DISCUSS ADVISORY: http://secunia.com/advisories/45744/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/45744/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=45744

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Red Hat has issued an update for system-config-printer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

ORIGINAL ADVISORY: RHSA-2011:1196-1: https://rhn.redhat.com/errata/RHSA-2011-1196.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: system-config-printer security update Advisory ID: RHSA-2011:1196-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1196.html Issue date: 2011-08-23 CVE Names: CVE-2011-2899 =====================================================================

  1. Summary:

Updated system-config-printer packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

  1. Description:

system-config-printer is a print queue configuration tool with a graphical user interface.

It was found that system-config-printer did not properly sanitize NetBIOS and workgroup names when searching for network printers. (CVE-2011-2899)

All users of system-config-printer are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. Running instances of system-config-printer must be restarted for this update to take effect.

  1. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259

  1. Bugs fixed (http://bugzilla.redhat.com/):

728348 - CVE-2011-2899 system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames

  1. Package List:

Red Hat Enterprise Linux AS version 4:

Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm

i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm

ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm

ppc: system-config-printer-0.6.116.10-1.6.el4.ppc.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ppc.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ppc.rpm

s390: system-config-printer-0.6.116.10-1.6.el4.s390.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.s390.rpm system-config-printer-gui-0.6.116.10-1.6.el4.s390.rpm

s390x: system-config-printer-0.6.116.10-1.6.el4.s390x.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.s390x.rpm system-config-printer-gui-0.6.116.10-1.6.el4.s390x.rpm

x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm

i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm

x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm

i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm

ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm

x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm

i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm

ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm

x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm

i386: system-config-printer-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm

x86_64: system-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm

i386: system-config-printer-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm

ia64: system-config-printer-0.7.32.10-1.el5_7.1.ia64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ia64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.ia64.rpm

ppc: system-config-printer-0.7.32.10-1.el5_7.1.ppc.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ppc.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.ppc.rpm

s390x: system-config-printer-0.7.32.10-1.el5_7.1.s390x.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.s390x.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.s390x.rpm

x86_64: system-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package

  1. References:

https://www.redhat.com/security/data/cve/CVE-2011-2899.html https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFOU73QXlSAg2UNWIIRAtaOAJ4oVWJE3+Im60upiHPtmPVeJkRb0QCfc8tF stTz73xLpDfC+ZVI/tlNOsA= =up1e -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201108-0226",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.107"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.116"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.109"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.115"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.113"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.110"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.112"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.111"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.114"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "redhat",
        "version": "0.6.108"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.93"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.99"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82.3"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.38"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.66"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82.4"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.53"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.62"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.78"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.66"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.86"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.51"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.64"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.105"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.15"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.61"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.48"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.102"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.10"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.65"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.11"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.100"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.32.9"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.13"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.63.2"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.60"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.4"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.68"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.7"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.7"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.71"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.73"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.79"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.62"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.14"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.25"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.70"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.26"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.56"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.75"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.4"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.37"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.75"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.12"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.76"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.63.4"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.5"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.9"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.54"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.79"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.31"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.67"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.41"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.52"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.104"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.29"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.88"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.82"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.87"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.28"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.18"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.103"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.50"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.32.7"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.36"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.69"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.3"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.1"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.6"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.9"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.98"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.39"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.46"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.57"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.78"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.5"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.6"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.1"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82.5"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.32.6"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.8"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.40"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.35"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.96"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82.1"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.95"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.12"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.89"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.106"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.72"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.65"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.84"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.10"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.68"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.22"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.72"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.0"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.43"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.77"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.63"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.24"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.8"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.30"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.21"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.94"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.34"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.82.2"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.33"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.42"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.63"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.3"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.55"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.32.10"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.81"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.76"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.70"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.85"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.101"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.17"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.90"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.32.8"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.20"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.13"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.45"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.63.3"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.64"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.71"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.83"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.2"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.47"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.32"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.80"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.97"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.73"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.16"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.74"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.58"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.19"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.2"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.27"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.63.1"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.60"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.61"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.91"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.74.11"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.69"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.23"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.44"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.92"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.49"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.6.59"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.81"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.77"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.67"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "0.7.80"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5 (server)"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5.0 (client)"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "0.6.x"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "0.7.x"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "system config printer",
        "version": "1.1.3"
      },
      {
        "model": "system-config-printer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "system config printer",
        "version": "1.0"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux desktop version",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "4"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "5"
      },
      {
        "model": "hat enterprise linux desktop client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "red",
        "version": "5"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.1.2"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.1.1"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.2.2"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.2.1"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.2"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.1"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.0.1"
      },
      {
        "model": "proactive contact",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "4.0"
      },
      {
        "model": "iq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "iq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1.1"
      },
      {
        "model": "iq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.1"
      },
      {
        "model": "iq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1.3"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1.2"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1.1"
      },
      {
        "model": "aura system manager sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "aura system manager sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "aura system manager sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      },
      {
        "model": "aura system manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "5.2"
      },
      {
        "model": "aura presence services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1.1"
      },
      {
        "model": "aura presence services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.1"
      },
      {
        "model": "aura presence services",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avaya",
        "version": "6.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "49288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.63.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.63.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.63.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.78:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.79:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.80:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.81:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.32.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.32.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.32.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.67:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.68:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.69:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.32.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.63.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.64:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.76:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.32.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.65:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.74.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.77:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.7.82.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.43:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.56:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.57:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.58:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.59:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.76:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.90:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.91:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.92:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.93:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.106:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.107:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.108:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.109:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.110:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.48:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.49:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.65:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.67:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.68:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.81:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.82:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.83:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.84:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.85:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.98:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.99:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.100:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.101:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.115:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.116:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.35:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.37:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.39:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.44:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.46:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.53:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.55:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.64:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.69:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.78:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.80:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.87:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.89:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.94:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.96:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.103:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.105:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.112:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.114:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.38:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.45:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.47:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.54:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.77:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.79:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.86:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.88:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.95:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.97:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.102:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.104:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.111:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:redhat:system-config-printer:0.6.113:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vincent Danen",
    "sources": [
      {
        "db": "BID",
        "id": "49288"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-2899",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.1,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2011-2899",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-50844",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-2899",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201108-442",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-50844",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "pysmb.py in system-config-printer 0.6.x and 0.7.x, as used in foomatic-gui and possibly other products, allows remote SMB servers to execute arbitrary commands via shell metacharacters in the (1) NetBIOS or (2) workgroup name, which are not properly handled when searching for network printers. The \u0027system-config-printer\u0027 package is prone to a local privilege-escalation vulnerability. \nLocal attackers can exploit this issue to execute arbitrary code with the privileges of the user running the affected application. Successful exploits may aid in the compromise of affected computers. A vulnerability exists in pysmb.py of system-config-printer. ----------------------------------------------------------------------\n\nThe Secunia CSI 5.0 Beta - now available for testing\nFind out more, take a free test drive, and share your opinion with us: \nhttp://secunia.com/blog/242 \n\n----------------------------------------------------------------------\n\nTITLE:\nRed Hat update for system-config-printer\n\nSECUNIA ADVISORY ID:\nSA45744\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/45744/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45744\n\nRELEASE DATE:\n2011-08-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/45744/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/45744/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45744\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nRed Hat has issued an update for system-config-printer. This fixes a\nvulnerability, which can be exploited by malicious people to\ncompromise a user\u0027s system. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nORIGINAL ADVISORY:\nRHSA-2011:1196-1:\nhttps://rhn.redhat.com/errata/RHSA-2011-1196.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: system-config-printer security update\nAdvisory ID:       RHSA-2011:1196-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1196.html\nIssue date:        2011-08-23\nCVE Names:         CVE-2011-2899 \n=====================================================================\n\n1. Summary:\n\nUpdated system-config-printer packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 and 5. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux Desktop version 4 - i386, x86_64\nRed Hat Enterprise Linux ES version 4 - i386, ia64, x86_64\nRed Hat Enterprise Linux WS version 4 - i386, ia64, x86_64\n\n3. Description:\n\nsystem-config-printer is a print queue configuration tool with a graphical\nuser interface. \n\nIt was found that system-config-printer did not properly sanitize NetBIOS\nand workgroup names when searching for network printers. (CVE-2011-2899)\n\nAll users of system-config-printer are advised to upgrade to these updated\npackages, which contain a backported patch to resolve this issue. Running\ninstances of system-config-printer must be restarted for this update to\ntake effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n728348 - CVE-2011-2899 system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames\n\n6. Package List:\n\nRed Hat Enterprise Linux AS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm\n\ni386:\nsystem-config-printer-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm\n\nia64:\nsystem-config-printer-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm\n\nppc:\nsystem-config-printer-0.6.116.10-1.6.el4.ppc.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.ppc.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.ppc.rpm\n\ns390:\nsystem-config-printer-0.6.116.10-1.6.el4.s390.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.s390.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.s390.rpm\n\ns390x:\nsystem-config-printer-0.6.116.10-1.6.el4.s390x.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.s390x.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.s390x.rpm\n\nx86_64:\nsystem-config-printer-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm\n\ni386:\nsystem-config-printer-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm\n\nx86_64:\nsystem-config-printer-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm\n\nRed Hat Enterprise Linux ES version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm\n\ni386:\nsystem-config-printer-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm\n\nia64:\nsystem-config-printer-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm\n\nx86_64:\nsystem-config-printer-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm\n\nRed Hat Enterprise Linux WS version 4:\n\nSource:\nftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm\n\ni386:\nsystem-config-printer-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm\n\nia64:\nsystem-config-printer-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm\n\nx86_64:\nsystem-config-printer-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm\nsystem-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm\n\ni386:\nsystem-config-printer-0.7.32.10-1.el5_7.1.i386.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm\n\nx86_64:\nsystem-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm\n\ni386:\nsystem-config-printer-0.7.32.10-1.el5_7.1.i386.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm\n\nia64:\nsystem-config-printer-0.7.32.10-1.el5_7.1.ia64.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ia64.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.ia64.rpm\n\nppc:\nsystem-config-printer-0.7.32.10-1.el5_7.1.ppc.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ppc.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.ppc.rpm\n\ns390x:\nsystem-config-printer-0.7.32.10-1.el5_7.1.s390x.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.s390x.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.s390x.rpm\n\nx86_64:\nsystem-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm\nsystem-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm\nsystem-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-2899.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e.  More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOU73QXlSAg2UNWIIRAtaOAJ4oVWJE3+Im60upiHPtmPVeJkRb0QCfc8tF\nstTz73xLpDfC+ZVI/tlNOsA=\n=up1e\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "BID",
        "id": "49288"
      },
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "PACKETSTORM",
        "id": "104414"
      },
      {
        "db": "PACKETSTORM",
        "id": "104395"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-50844",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-2899",
        "trust": 2.9
      },
      {
        "db": "SECUNIA",
        "id": "45744",
        "trust": 2.6
      },
      {
        "db": "SECTRACK",
        "id": "1025967",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "49288",
        "trust": 1.2
      },
      {
        "db": "OSVDB",
        "id": "74870",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442",
        "trust": 0.7
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2011:1196",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "104395",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-50844",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "104414",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "BID",
        "id": "49288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "PACKETSTORM",
        "id": "104414"
      },
      {
        "db": "PACKETSTORM",
        "id": "104395"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "id": "VAR-201108-0226",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:58:23.681000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RHSA-2011:1196",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2011-1196.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securitytracker.com/id?1025967"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/45744"
      },
      {
        "trust": 2.0,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728348"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2011-1196.html"
      },
      {
        "trust": 1.7,
        "url": "https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119"
      },
      {
        "trust": 1.6,
        "url": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui\u0026r1=1.2\u0026r2=1.3\u0026view=patch"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2899"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2899"
      },
      {
        "trust": 0.8,
        "url": "http://osvdb.org/74870"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/49288"
      },
      {
        "trust": 0.3,
        "url": "http://cyberelk.net/tim/software/system-config-printer/"
      },
      {
        "trust": 0.3,
        "url": "http://support.avaya.com/css/p8/documents/100148016"
      },
      {
        "trust": 0.2,
        "url": "https://rhn.redhat.com/errata/rhsa-2011-1196.html"
      },
      {
        "trust": 0.1,
        "url": "http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui\u0026amp;r1=1.2\u0026amp;r2=1.3\u0026amp;view=patch"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=45744"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/242"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/45744/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/45744/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2899"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/kb/docs/doc-11259"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/#package"
      },
      {
        "trust": 0.1,
        "url": "https://www.redhat.com/security/data/cve/cve-2011-2899.html"
      },
      {
        "trust": 0.1,
        "url": "http://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/contact/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "BID",
        "id": "49288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "PACKETSTORM",
        "id": "104414"
      },
      {
        "db": "PACKETSTORM",
        "id": "104395"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "db": "BID",
        "id": "49288"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "db": "PACKETSTORM",
        "id": "104414"
      },
      {
        "db": "PACKETSTORM",
        "id": "104395"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-08-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "date": "2011-08-04T00:00:00",
        "db": "BID",
        "id": "49288"
      },
      {
        "date": "2011-09-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "date": "2011-08-24T03:58:37",
        "db": "PACKETSTORM",
        "id": "104414"
      },
      {
        "date": "2011-08-24T03:13:07",
        "db": "PACKETSTORM",
        "id": "104395"
      },
      {
        "date": "2011-08-31T23:55:03.457000",
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "date": "2011-08-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-50844"
      },
      {
        "date": "2011-09-08T15:50:00",
        "db": "BID",
        "id": "49288"
      },
      {
        "date": "2011-09-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      },
      {
        "date": "2012-06-15T04:00:00",
        "db": "NVD",
        "id": "CVE-2011-2899"
      },
      {
        "date": "2011-09-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "104395"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "foomatic-gui Used in other products  pysmb.py Vulnerable to arbitrary command execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-002214"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201108-442"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…