mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
377 lines
10 KiB
JSON
377 lines
10 KiB
JSON
{
|
|
"id": "CVE-2019-6326",
|
|
"sourceIdentifier": "hp-security-alert@hp.com",
|
|
"published": "2019-06-17T16:15:12.747",
|
|
"lastModified": "2024-11-21T04:46:24.950",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "HP Color LaserJet Pro M280-M281 Multifunction Printer series (before v. 20190419), HP LaserJet Pro MFP M28-M31 Printer series (before v. 20190426) may have embedded web server attributes which may be potentially vulnerable to Buffer Overflow."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La serie de impresoras multifunci\u00f3n HP Color LaserJet Pro M280-M281 (anterior v. 20190419), la serie de impresoras HP LaserJet Pro MFP M28-M31 (anterior v. 20190426) puede tener atributos de servidor web incrustados que pueden ser potencialmente vulnerables al desbordamiento de b\u00fafer."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"baseScore": 6.5,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:t6b80a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-19",
|
|
"matchCriteriaId": "DBA7A789-DFED-4CA8-ADBD-E9992BC22A89"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t6b80a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B68B7D89-D81D-441D-9CCC-02CA70D0DC3A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:t6b83a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-19",
|
|
"matchCriteriaId": "9BEF4C86-D8B1-4CEE-A870-C57AB3DD2EEF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t6b83a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3661A94-A825-4F35-AC91-1F68C77B9907"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:t6b81a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-19",
|
|
"matchCriteriaId": "1EFBC629-0E32-4AA7-9E40-7349EA9E194D"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t6b81a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37DB32AD-7388-487B-92F1-19F092A9BC2B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:t6b82a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-19",
|
|
"matchCriteriaId": "BAE3C3B8-37E2-4B12-82E5-E8D3046A9A88"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:t6b82a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2B358513-72B0-4FED-B063-744B76F9C1B0"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:w2g54a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "3223FEB5-1487-436F-8107-E125A4AD6D56"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:w2g54a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "31575D91-4914-41A9-9466-E93020A84241"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:w2g55a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "80A9A7E2-9BC4-4E80-A6F0-B05741123642"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:w2g55a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59F4DC8D-ECDA-4575-A106-B68298A0BB5C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:y5s53a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "6D2970D1-A37B-49D9-A8FC-8D43A7B78C63"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:y5s53a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "59D2252D-64AB-4D6A-A655-76B6B092A8D5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:y5s55a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "4F151694-8818-413E-BBFA-DC0D4E94F4E9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:y5s55a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E727276-F0AF-47F6-9D58-393EFD4ED6F2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:y5s50a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "11184C84-1740-47B0-B412-09E7122710A8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:y5s50a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CB990FE3-281B-4E72-98AC-A045F1F27E54"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:y5s54a_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2019-04-26",
|
|
"matchCriteriaId": "3FBBE624-D748-40C4-AEF7-03A731FC954C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:hp:y5s54a:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEBB0EEA-61D0-4FE6-91EA-7671ABD7776D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.hp.com/us-en/document/c06356322",
|
|
"source": "hp-security-alert@hp.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://support.hp.com/us-en/document/c06356322",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |