239 lines
6.3 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2002-1796",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-12-31T05:00:00.000",
"lastModified": "2025-01-16T20:15:26.960",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "ChaiVM EZloader for HP color LaserJet 4500 and 4550 and HP LaserJet 4100 and 8150 does not properly verify JAR signatures for new services, which allows local users to load unauthorized Chai services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
2023-04-24 12:24:31 +02:00
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 4.6,
2023-04-24 12:24:31 +02:00
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
2023-04-24 12:24:31 +02:00
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
2023-04-24 12:24:31 +02:00
}
],
"configurations": [
{
"operator": "AND",
2023-04-24 12:24:31 +02:00
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hp:chaivm_ezloader:-:*:*:*:*:*:*:*",
"matchCriteriaId": "490B782C-11BF-47E2-8899-8B462D2D8AA6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:laserjet_4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A1779FF-AF54-49D7-B357-3CB62371FA21"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:laserjet_4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FADCF8F9-297F-43B8-A380-D91FDB66BD98"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:laserjet_4550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF0E42-3082-4648-BA3A-3372763F72DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:laserjet_8150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D75D04-E717-4361-9D62-08DCFF23ED9A"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
],
"references": [
{
"url": "http://online.securityfocus.com/advisories/4317",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Patch",
"Third Party Advisory",
"VDB Entry",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/9695.php",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
},
{
"url": "http://www.phenoelit.de/stuff/HP_Chai.txt",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/284648",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.securityfocus.com/bid/5334",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://online.securityfocus.com/advisories/4317",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch",
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/9695.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.phenoelit.de/stuff/HP_Chai.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/archive/1/284648",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securityfocus.com/bid/5334",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
2023-04-24 12:24:31 +02:00
}
]
}