All the vulnerabilites related to hp - 9000
var-201011-0192
Vulnerability from variot
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack. HP LaserJet Printers is a line of laser printers from Hewlett Packard. The affected printer products are as follows: * HP LaserJet MFP printers (all supported print job language (PJL) models). HP Color LaserJet MFP printers (all supported print job language (PJL) models). HP LaserJet 4100, 4200 , 4300, 5100, 8150 and 9000 series. Multiple HP printers are prone to a directory-traversal vulnerability because the devices' webserver fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta.
Join the beta: http://secunia.com/products/corporate/vim/
TITLE: HP LaserJet Printers PJL Directory Traversal Vulnerability
SECUNIA ADVISORY ID: SA42238
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42238/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42238
RELEASE DATE: 2010-11-17
DISCUSS ADVISORY: http://secunia.com/advisories/42238/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/42238/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=42238
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in HP LaserJet Printers, which can be exploited by malicious people to disclose potentially sensitive information.
SOLUTION: Apply the workaround (please see the vendor's advisory for details).
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: The vendor credits Moritz Jodeit, n.runs AG.
ORIGINAL ADVISORY: HPSBPI02575 SSRT090255: https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. The vulnerability could be exploited remotely to gain unauthorized access to files.
References: CVE-2010-4107
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The vulnerability can be avoided by either one of the following actions:
disable file system access via the PJL interface set a PJL password
These recommendations are documented in the "HP Imaging and Printing Security Best Practices - Configuring Security for Multiple LaserJet MFPs and Color LaserJet MFPs" manual, available here:
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c01707469/c01707469.pdf?jumpid=reg_R1002_USEN
PRODUCT SPECIFIC INFORMATION None
HISTORY Version:1 (rev.1) - 15 November 2010 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2010 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkzhBl0ACgkQ4B86/C0qfVnKygCg3C3tUUIdfs4kS2lwHfGa7ayn UFsAoNqbOe7VIg0V4M/CdoHWlyTClza7 =/Da0 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201011-0192", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "laserjet 5100", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "laserjet 8150", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "laserjet mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "9000", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "laserjet 4300", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "laserjet 4200", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "color laserjet mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "laserjet 4100", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "9000", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "color laserjet mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet 4100", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet 4200", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet 4300", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet 5100", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet 8150", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "color lasterjet mfp", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "6040" }, { "model": "lasterjet m5025/5035 mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "lasterjet m3027/3035 mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "lasterjet m1522n mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "9000" }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "8150" }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5100" }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4300" }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4200" }, { "model": "lasterjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4100" }, { "model": "color laserjet mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet 4200", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet 4300", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet 5100", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "9000", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet 8150", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet 4100", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet m9050 mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m4345x mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m1522n mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "90500" }, { "model": "laserjet 9000mfp", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9000" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8150" }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "50350" }, { "model": "laserjet 4345mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "43450" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4300" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4200" }, { "model": "laserjet 4100mfp", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4100" }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "30350" }, { "model": "laserjet series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5100" }, { "model": "color laserjet cm4730 mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet 9500mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "60400" }, { "model": "color laserjet 4730mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "47300" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "BID", "id": "44882" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:laserjet_5100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_8150:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_mfp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_mfp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4200:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4300:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:9000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-4107" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Moritz Jodeit", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-192" } ], "trust": 0.6 }, "cve": "CVE-2010-4107", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-4107", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-4107", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201011-192", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2010-4107", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device\u0027s filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack. HP LaserJet Printers is a line of laser printers from Hewlett Packard. The affected printer products are as follows: * HP LaserJet MFP printers (all supported print job language (PJL) models).* HP Color LaserJet MFP printers (all supported print job language (PJL) models).* HP LaserJet 4100, 4200 , 4300, 5100, 8150 and 9000 series. Multiple HP printers are prone to a directory-traversal vulnerability because the devices\u0027 webserver fails to sufficiently sanitize user-supplied input. \nExploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta. \n\nJoin the beta: \nhttp://secunia.com/products/corporate/vim/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nHP LaserJet Printers PJL Directory Traversal Vulnerability\n\nSECUNIA ADVISORY ID:\nSA42238\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/42238/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42238\n\nRELEASE DATE:\n2010-11-17\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/42238/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/42238/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42238\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in HP LaserJet Printers, which can\nbe exploited by malicious people to disclose potentially sensitive\ninformation. \n\nSOLUTION:\nApply the workaround (please see the vendor\u0027s advisory for details). \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Moritz Jodeit, n.runs AG. \n\nORIGINAL ADVISORY:\nHPSBPI02575 SSRT090255:\nhttps://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. The vulnerability could be exploited remotely to gain unauthorized access to files. \n\nReferences: CVE-2010-4107\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The vulnerability can be avoided by either one of the following actions:\n\ndisable file system access via the PJL interface\nset a PJL password\n\nThese recommendations are documented in the \"HP Imaging and Printing Security Best Practices - Configuring Security for Multiple LaserJet MFPs and Color LaserJet MFPs\" manual, available here:\n\nhttp://h20000.www2.hp.com/bc/docs/support/SupportManual/c01707469/c01707469.pdf?jumpid=reg_R1002_USEN\n\nPRODUCT SPECIFIC INFORMATION\nNone\n\nHISTORY\nVersion:1 (rev.1) - 15 November 2010 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2010 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAkzhBl0ACgkQ4B86/C0qfVnKygCg3C3tUUIdfs4kS2lwHfGa7ayn\nUFsAoNqbOe7VIg0V4M/CdoHWlyTClza7\n=/Da0\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "BID", "id": "44882" }, { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "PACKETSTORM", "id": "95904" }, { "db": "PACKETSTORM", "id": "95887" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=32990", "trust": 0.4, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4107" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-4107", "trust": 3.5 }, { "db": "SECUNIA", "id": "42238", "trust": 2.4 }, { "db": "SECTRACK", "id": "1024741", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2010-2987", "trust": 1.7 }, { "db": "BID", "id": "44882", "trust": 1.4 }, { "db": "SREASON", "id": "8328", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "15631", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2010-003342", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2010-2826", "trust": 0.6 }, { "db": "NSFOCUS", "id": "16009", "trust": 0.6 }, { "db": "HP", "id": "SSRT090255", "trust": 0.6 }, { "db": "HP", "id": "HPSBPI02575", "trust": 0.6 }, { "db": "XF", "id": "63261", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201011-192", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "32990", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-4107", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "95904", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "95887", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "BID", "id": "44882" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "PACKETSTORM", "id": "95904" }, { "db": "PACKETSTORM", "id": "95887" }, { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "id": "VAR-201011-0192", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" } ], "trust": 1.42 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" } ] }, "last_update_date": "2023-12-18T12:52:27.947000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBPI02575 SSRT090255", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02004333" }, { "title": "Patch for HP LaserJet Printers PJL Directory Traversal Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/1746" }, { "title": "HP: HPSBPI02575 SSRT090255 rev.3 - HP LaserJet MFP Printers, HP Color LaserJet MFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to Files", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbpi02575" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "NVD", "id": "CVE-2010-4107" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02004333" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "trust": 1.7, "url": "http://secunia.com/advisories/42238" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1024741" }, { "trust": 1.4, "url": "http://www.nruns.com/_downloads/sa-2010%20003-hewlett-packard.pdf" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/44882" }, { "trust": 1.1, "url": "http://www.exploit-db.com/exploits/15631" }, { "trust": 1.1, "url": "http://securityreason.com/securityalert/8328" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4107" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4107" }, { "trust": 0.7, "url": "http://secunia.com/advisories/42238/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/63261" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16009" }, { "trust": 0.3, "url": "http://www.hp.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/32990/" }, { "trust": 0.1, "url": "https://support.hp.com/us-en/document/c02004333" }, { "trust": 0.1, "url": "http://secunia.com/advisories/42238/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=42238" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.hp.com/go/secureprinting" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4107" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://h20000.www2.hp.com/bc/docs/support/supportmanual/c01707469/c01707469.pdf?jumpid=reg_r1002_usen" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "BID", "id": "44882" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "PACKETSTORM", "id": "95904" }, { "db": "PACKETSTORM", "id": "95887" }, { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2010-2826" }, { "db": "VULMON", "id": "CVE-2010-4107" }, { "db": "BID", "id": "44882" }, { "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "db": "PACKETSTORM", "id": "95904" }, { "db": "PACKETSTORM", "id": "95887" }, { "db": "NVD", "id": "CVE-2010-4107" }, { "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-17T00:00:00", "db": "CNVD", "id": "CNVD-2010-2826" }, { "date": "2010-11-17T00:00:00", "db": "VULMON", "id": "CVE-2010-4107" }, { "date": "2010-11-15T00:00:00", "db": "BID", "id": "44882" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "date": "2010-11-17T12:19:14", "db": "PACKETSTORM", "id": "95904" }, { "date": "2010-11-16T20:59:33", "db": "PACKETSTORM", "id": "95887" }, { "date": "2010-11-17T16:00:02.623000", "db": "NVD", "id": "CVE-2010-4107" }, { "date": "2010-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-17T00:00:00", "db": "CNVD", "id": "CNVD-2010-2826" }, { "date": "2017-08-17T00:00:00", "db": "VULMON", "id": "CVE-2010-4107" }, { "date": "2014-05-06T01:11:00", "db": "BID", "id": "44882" }, { "date": "2012-03-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-003342" }, { "date": "2017-08-17T01:33:06.837000", "db": "NVD", "id": "CVE-2010-4107" }, { "date": "2010-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-192" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-192" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural HP Used in printer products File System External Access Setting PJL Access value Arbitrary file read vulnerability in default settings", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-003342" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-192" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
hp | 9000 | * | |
hp | color_laserjet_mfp | * | |
hp | laserjet_4100 | * | |
hp | laserjet_4200 | * | |
hp | laserjet_4300 | * | |
hp | laserjet_5100 | * | |
hp | laserjet_8150 | * | |
hp | laserjet_mfp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF8B3AD7-0806-4A30-82A5-3C82C740CAEB", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:color_laserjet_mfp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB31A9-1978-47B9-B3E6-A596C429C190", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_4100:*:*:*:*:*:*:*:*", "matchCriteriaId": "549105CC-BA47-4C39-8B8A-9CAC39266B30", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_4200:*:*:*:*:*:*:*:*", "matchCriteriaId": "4993667F-9DE8-4DC9-90B1-A6D3AB6BFB0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_4300:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B4B141B-3358-469D-8331-88C5924763EC", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_5100:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC0F236F-7EC3-440B-8FF4-362729EF0807", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_8150:*:*:*:*:*:*:*:*", "matchCriteriaId": "F94DFDFD-0CEA-4EC5-8E7D-0548DCAE5563", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:laserjet_mfp:*:*:*:*:*:*:*:*", "matchCriteriaId": "7597BC26-E540-4FAF-AEAA-38DA4D09191C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device\u0027s filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack." }, { "lang": "es", "value": "La configuraci\u00f3n por defecto del valor PJL Access en las opciones de File System External Access de las impresoras HP LaserJet MFP, Color LaserJet MFP, LaserJet 4100, 4200, 4300, 5100, 8150, y 9000, activan los comandos PJL que usa el sistema de archivos del dispositivo, lo que permite a atacantes remotos la lectura de archivos de su elecci\u00f3n a trav\u00e9s de un comando en el trabajo activo como se ha demostrado con un ataque de salto de directorio." } ], "id": "CVE-2010-4107", "lastModified": "2024-11-21T01:20:15.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-11-17T16:00:02.623", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42238" }, { "source": "hp-security-alert@hp.com", "url": "http://securityreason.com/securityalert/8328" }, { "source": "hp-security-alert@hp.com", "url": "http://securitytracker.com/id?1024741" }, { "source": "hp-security-alert@hp.com", "url": "http://www.exploit-db.com/exploits/15631" }, { "source": "hp-security-alert@hp.com", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "source": "hp-security-alert@hp.com", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "source": "hp-security-alert@hp.com", "url": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securityfocus.com/bid/44882" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "source": "hp-security-alert@hp.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/15631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/44882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:9000:800:*:*:*:*:*:*:*", "matchCriteriaId": "487DFFD8-F648-4D8F-8919-FC600A5D828B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/X/V Class console via the Service Support Processor (SSP) Teststation." } ], "id": "CVE-1999-1163", "lastModified": "2024-11-20T23:30:27.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-11-24T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=94347039929958\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7439.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=94347039929958\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7439.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
hp | hp-ux | 7.00 | |
hp | hp-ux | 7.02 | |
hp | hp-ux | 7.04 | |
hp | hp-ux | 7.06 | |
hp | hp-ux | 7.08 | |
hp | hp-ux | 8.00 | |
hp | hp-ux | 8.01 | |
hp | hp-ux | 8.02 | |
hp | hp-ux | 8.04 | |
hp | hp-ux | 8.05 | |
hp | hp-ux | 8.06 | |
hp | hp-ux | 8.07 | |
hp | hp-ux | 8.08 | |
hp | hp-ux | 8.09 | |
hp | hp-ux | 9.00 | |
hp | hp-ux | 9.01 | |
hp | hp-ux | 9.03 | |
hp | hp-ux | 9.04 | |
hp | hp-ux | 9.05 | |
hp | hp-ux | 9.06 | |
hp | hp-ux | 9.07 | |
hp | hp-ux | 9.08 | |
hp | hp-ux | 9.09 | |
hp | hp-ux | 9.10 | |
hp | hp-ux | 10.00 | |
hp | hp-ux | 10.01 | |
hp | hp-ux | 10.08 | |
hp | hp-ux | 10.09 | |
hp | hp-ux | 10.10 | |
hp | hp-ux | 10.16 | |
hp | hp-ux | 10.20 | |
hp | hp-ux | 10.24 | |
hp | hp-ux | 10.30 | |
hp | hp-ux | 10.34 | |
hp | hp-ux | 11.00 | |
hp | aserver | * | |
hp | 9000 | 7_800 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*", "matchCriteriaId": "903312B4-BE2F-4170-AA8A-2802E2554662", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*", "matchCriteriaId": "4E21C6EC-D15D-487B-B2FA-BF32D9B8EA79", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*", "matchCriteriaId": "DC664E65-5C9C-4796-86E5-A0B2539ED793", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*", "matchCriteriaId": "DA3F0D15-D854-4BD0-8590-9C941840BC5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*", "matchCriteriaId": "23628ED6-1EF9-494F-BBA0-DEC67A6B12E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*", "matchCriteriaId": "A573388D-BD8F-48D3-8BA9-E4D11402CA22", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*", "matchCriteriaId": "9B172217-D993-4D8C-8E37-4D966D103AAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*", "matchCriteriaId": "6973B4FC-8009-4336-BED4-7B032EA1E570", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*", "matchCriteriaId": "2777DC9F-683A-4892-B305-4EFEFDDBCCE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*", "matchCriteriaId": "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*", "matchCriteriaId": "D0EB2E93-9774-442C-BB60-E428F53EE6F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*", "matchCriteriaId": "44521B9A-7796-4E4A-99F0-026D45BDB7B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*", "matchCriteriaId": "F489B454-F1ED-4DEA-8248-A97D68611FCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*", "matchCriteriaId": "C6296277-D10E-4CAA-96F5-BEB61B4640FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*", "matchCriteriaId": "6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*", "matchCriteriaId": "DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*", "matchCriteriaId": "E7FA635E-C0FE-495C-A2BB-D9C30A95FD00", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "E178238D-E17A-48C9-8922-AC92474BDF55", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*", "matchCriteriaId": "560C17E1-6154-4291-A838-5E76139B9FB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*", "matchCriteriaId": "3194CFA3-F0B3-487A-99C6-1A7DF1EF0586", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*", "matchCriteriaId": "035890F7-BF48-4669-812A-1DCBD91A8F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*", "matchCriteriaId": "F9AED8F3-2501-444D-8141-37FEE2246747", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*", "matchCriteriaId": "10974B0F-DA3A-4E3E-8914-8CEB366E9CC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "C54F7F74-7DD7-431E-AE75-1D1199D63032", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*", "matchCriteriaId": "2170549C-80D2-4FF8-AC07-BD4124125B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*", "matchCriteriaId": "066D4E93-366F-42D4-B27D-8AF981F5F2AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*", "matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:aserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F978F803-AC52-4856-A86F-CD53E9F6C6D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:hp:9000:7_800:*:*:*:*:*:*:*", "matchCriteriaId": "587A1F2E-EBE3-4349-A859-A2B780C51CC4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HP-UX aserver program allows local users to gain privileges via a symlink attack." } ], "id": "CVE-2000-0005", "lastModified": "2024-11-20T23:31:30.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-01-02T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2010-4107
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1024741 | vdb-entry, x_refsource_SECTRACK | |
http://www.exploit-db.com/exploits/15631 | exploit, x_refsource_EXPLOIT-DB | |
http://securityreason.com/securityalert/8328 | third-party-advisory, x_refsource_SREASON | |
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333 | vendor-advisory, x_refsource_HP | |
http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf | x_refsource_MISC | |
http://secunia.com/advisories/42238 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/2987 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/44882 | vdb-entry, x_refsource_BID | |
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333 | vendor-advisory, x_refsource_HP | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/63261 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024741", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024741" }, { "name": "15631", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/15631" }, { "name": "8328", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8328" }, { "name": "HPSBPI02575", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf" }, { "name": "42238", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42238" }, { "name": "ADV-2010-2987", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "name": "44882", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/44882" }, { "name": "SSRT090255", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "name": "hp-laserjet-pjl-directory-traversal(63261)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device\u0027s filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "1024741", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024741" }, { "name": "15631", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/15631" }, { "name": "8328", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8328" }, { "name": "HPSBPI02575", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf" }, { "name": "42238", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42238" }, { "name": "ADV-2010-2987", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "name": "44882", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/44882" }, { "name": "SSRT090255", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "name": "hp-laserjet-pjl-directory-traversal(63261)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2010-4107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device\u0027s filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024741", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024741" }, { "name": "15631", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/15631" }, { "name": "8328", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8328" }, { "name": "HPSBPI02575", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "name": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf", "refsource": "MISC", "url": "http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf" }, { "name": "42238", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42238" }, { "name": "ADV-2010-2987", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2987" }, { "name": "44882", "refsource": "BID", "url": "http://www.securityfocus.com/bid/44882" }, { "name": "SSRT090255", "refsource": "HP", "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02004333" }, { "name": "hp-laserjet-pjl-directory-traversal(63261)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/63261" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2010-4107", "datePublished": "2010-11-17T15:00:00", "dateReserved": "2010-10-27T00:00:00", "dateUpdated": "2024-08-07T03:34:37.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1163
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/7439.php | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=94347039929958&w=2 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "hp-ssp(7439)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7439.php" }, { "name": "HPSBUX9911-105", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=94347039929958\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-11-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/X/V Class console via the Service Support Processor (SSP) Teststation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-20T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "hp-ssp(7439)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7439.php" }, { "name": "HPSBUX9911-105", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=94347039929958\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/X/V Class console via the Service Support Processor (SSP) Teststation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "hp-ssp(7439)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7439.php" }, { "name": "HPSBUX9911-105", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=94347039929958\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1163", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:5635", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "HP-UX aserver program allows local users to gain privileges via a symlink attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:5635", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HP-UX aserver program allows local users to gain privileges via a symlink attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:5635", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0005", "datePublished": "2000-02-04T05:00:00", "dateReserved": "2000-01-11T00:00:00", "dateUpdated": "2024-08-08T04:58:11.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }