var-201304-0028
Vulnerability from variot
Directory traversal vulnerability in the PostScript Interpreter, as used on the HP LaserJet 4xxx, 5200, 90xx, M30xx, M4345, M50xx, M90xx, P3005, and P4xxx; LaserJet Enterprise P3015; Color LaserJet 3xxx, 47xx, 5550, 9500, CM60xx, CP35xx, CP4005, and CP6015; Color LaserJet Enterprise CP4xxx; and 9250c Digital Sender with model-dependent firmware through 52.x allows remote attackers to read arbitrary files via unknown vectors. HP LaserJet Printers is a family of laser printers developed by Hewlett Packard. Multiple HP Laser Printer products have security vulnerabilities that allow remote attackers to exploit vulnerabilities to bypass certain security restrictions and access certain files. Remote attackers can exploit this issue to gain access to sensitive information that may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03744742
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03744742 Version: 3
HPSBPI02869 SSRT100936 rev.3 - HP LaserJet MFP Printers, HP Color LaserJet MFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to Files
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability could be exploited remotely to gain unauthorized access to files.
References: CVE-2012-5221, iDefense [V-bxys4j4rnm], SSRT100936
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION below for a list of impacted products .
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-5221 (AV:N/AC:L/Au:N/C:C/I:N/A:N) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Andrei Costin working with the iDefense Vulnerability Contributor Program for reporting this vulnerability to security-alert@hp.com.
RESOLUTION HP recommends following the HP Imaging and Printing Security Best Practices available at http://h71028.www7.hp.com/enterprise/downloads/HP-Imaging10.pdf . Page 51 documents how to disable file access via Postscript.
In addition, HP has provided firmware updates that address this potential vulnerability. Please see the table below. To obtain the updated firmware, go to www.hp.com and follow the below steps to obtain the firmware Update.
Obtain the firmware update from www.hp.com :
Select "Drivers & Software". Enter the product name listed in the table below into the search field. Click on "Search". Click on the appropriate product. Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" Note: If the "Cross operating system ..." link is not present, select any Windows operating system from the list. Select the appropriate firmware update under "Firmware". Note use the firmware version listed or a more recent version, one that has a higher revision number.
Firmware Updates Product Name Model Firmware Update Version
HP Color LaserJet 3000 Q7534A v 46.070.1 (or higher)
HP Color LaserJet 3800 Q5981A v 46.070.1 (or higher)
HP Color LaserJet 4700 Q7492A v 46.220.1 (or higher)
HP Color LaserJet 4730 Multifunction Printer Q7517A v 46.370.1 (or higher)
HP Color LaserJet CM4730 Multifunction Printer CB480A v 50.272.8 (or higher)
HP Color LaserJet 5550 Q3714A v 07.220.1 (or higher)
HP Color LaserJet 9500 Multifunction Printer C8549A v 08.280.1 (or higher)
HP Color LaserJet CM6030 Multifunction Printer CE664A v 52.243.0 (or higher)
HP Color LaserJet CM6040 Multifunction Printer Q3939A v 52.243.0 (or higher)
HP Color LaserJet CP3505 CB442A v 03.150.1 (or higher)
HP Color LaserJet CP3525 CC469A v 06.171.2 (or higher)
HP Color LaserJet CP4005 CB503A v 46.220.1 (or higher)
HP Color LaserJet CP6015 Q3932A v 04.191.2 (or higher)
HP Color LaserJet Enterprise CP4025 CC490A v 07.151.3 (or higher)
HP Color LaserJet Enterprise CP4525 CC493A v 07.151.3 (or higher)
HP LaserJet 4240 Q7785A v 08.240.1 (or higher)
HP LaserJet 4250 Q5400A v 08.240.1 (or higher)
HP LaserJet 4345 Multifunction Printer Q3942A v 09.290.1 (or higher)
HP LaserJet 4350 Q5407A v 08.240.1 (or higher)
HP LaserJet 5200L Q7543A v 08.220.8 (or higher)
HP LaserJet 5200N Q7543A v 08.220.8 (or higher)
HP LaserJet 9040 Q7697A v 08.240.2 (or higher)
HP LaserJet 9040 Multifunction Printer Q3721A v 08.280.1 (or higher)
HP LaserJet 9050 Q7697A v 08.240.2 (or higher)
HP LaserJet 9050 Multifunction Printer Q3721A v 08.280.1 (or higher)
HP LaserJet Enterprise P3015 CE526A v 07.171.2 (or higher)
HP LaserJet M3027 Multifunction Printer CB416A v 48.292.8 (or higher)
HP LaserJet M3035 Multifunction Printer CB414A v 48.292.8 (or higher)
HP LaserJet CM3530 Multifunction Printer CC519A v 53.222.8 (or higher)
HP LaserJet M4345 Multifunction Printer CB425A v 48.292.8 (or higher)
HP LaserJet M5025 Multifunction Printer Q7840A v 48.292.8 (or higher)
HP LaserJet M5035 Multifunction Printer Q7829A v 48.292.8 (or higher)
HP LaserJet M9040 Multifunction Printer CC394A v 51.242.7 (or higher)
HP LaserJet M9050 Multifunction Printer CC395A v 51.242.7 (or higher)
HP LaserJet P3005 Q7812A v 02.180.1 (or higher)
HP LaserJet P4014 CB507A v 04.201.2 (or higher)
HP LaserJet P4015 CB509A v 04.201.2 (or higher)
HP LaserJet P4515 CB514A v 04.201.2 (or higher)
HP 9250c Digital Sender CB472A v 48.282.8 (or higher)
HISTORY Version:1 (rev.1) - 25 April 2013 Initial release Version:2 (rev.2) - 29 May 2013 Added a work around, added CM3530 printer, added a CM4730 printer, changed firmware version on CP3525, CM6030, CM6040 printers, changed model numbers for 9050 printer, added leading '0' to all firmware versions whose major version was a single digit. Merged 'Supported Software Versions' table, into 'Resolution' table. Version:3 (rev.3) - 20 February 2014 Updated firmware versions in 'Supported Software Versions' table, clarified Resolution instructions.
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlMGKroACgkQ4B86/C0qfVlS8gCcDgxsY8t4pERTC03RMDZbJBvm W4kAn3OHeoC8tSpppNV6haPe4+bwz+ro =oxhf -----END PGP SIGNATURE----- . Alternatively, to use the work around, please follow the steps in the 'work around'
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0028", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "laserjet 4350", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "q5407a" }, { "model": "laserjet 4345 mfp", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "q3942a" }, { "model": "laserjet 4250", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "q5400a" }, { "model": "color laserjet cp6015", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "q3932a" }, { "model": "color laserjet enterprise cp4525", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "cc493a" }, { "model": "color laserjet cp4005", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "cb503a" }, { "model": "color laserjet cp3505", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "cb442a" }, { "model": "color laserjet enterprise cp4025", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "cc490a" }, { "model": "color laserjet cp3525", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "cc469a" }, { "model": "laserjet 4240", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "q7785a" }, { "model": "laserjet m4345 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb425a" }, { "model": "laserjet 5200l", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7543a" }, { "model": "laserjet m9040 mpf", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cc394a" }, { "model": "color laserjet 3800", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q5981a" }, { "model": "laserjet enterprise p3015", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "ce526a" }, { "model": "laserjet 9040 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q3721a" }, { "model": "laserjet p4014", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb507a" }, { "model": "color laserjet 9500 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "c8549a" }, { "model": "color laserjet cm6030 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "ce664a" }, { "model": "laserjet 9050", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7697a" }, { "model": "laserjet 5200n", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7543a" }, { "model": "laserjet m5035 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7829a" }, { "model": "color laserjet 4700", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7492a" }, { "model": "laserjet m5025 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7840a" }, { "model": "laserjet m3035 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb414a" }, { "model": "laserjet 9040", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7697a" }, { "model": "color laserjet cm6040 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q3939a" }, { "model": "laserjet p3005", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7812a" }, { "model": "laserjet p4515", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb514a" }, { "model": "laserjet m3027 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb416a" }, { "model": "color laserjet 4730 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb480a" }, { "model": "color laserjet 5550", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q3714a" }, { "model": "laserjet 9050 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q3721a" }, { "model": "laserjet p4015", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb509a" }, { "model": "laserjet m9050 mpf", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cc395a" }, { "model": "laserjet m3035 mfp", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cc519a" }, { "model": "digital sender 9250c", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "cb472a" }, { "model": "color laserjet 3000", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "q7534a" }, { "model": "hp color laserjet 3000", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet 3800", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet 4700", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet 4730 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet 5550", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet 9500 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cm6030 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cm6040 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cp3505", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cp3525", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cp4005", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet cp6015", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet enterprise cp4025", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp color laserjet enterprise cp4525", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp digital sender 9250c", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 4240", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 4250", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 4345 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 4350", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 5200l", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 5200n", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 9040", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 9040 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 9050", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet 9050 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet enterprise p3015", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m3027 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m3035 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m4345 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m5025 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m5035 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m9040 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet m9050 mfp", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet p3005", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet p4014", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet p4015", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "hp laserjet p4515", "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": "laserjet p4014", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet p4015", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet p4515", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet cp6015", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "3000" }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "3800" }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4700" }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4730" }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5550" }, { "model": "color laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "9500" }, { "model": "color laserjet cm6030/cm6040 mfp series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet cp3505 series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet cp3525 series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet cp4005 series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "color laserjet cp4025/cp series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4525" }, { "model": "laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4240/4250/4340" }, { "model": "laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4345" }, { "model": "laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "4350" }, { "model": "laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "5200" }, { "model": "laserjet series", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "9040/9050" }, { "model": "laserjet m3027/3035 mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet m4345 multifunction printer series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet m5025/5035 mfp", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet m5035 mfp series m9040/m9050 multifunction", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet p3005 series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet p3015 series", "scope": null, "trust": 0.6, "vendor": "hp", "version": null }, { "model": "laserjet p4515", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet p4015", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet p4014", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet p3005", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m5035 multifunction printer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet m5025 multifunction printer", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet enterprise p3015", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "90500" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "90500" }, { "model": "laserjet 9040mpf", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "90400" }, { "model": "laserjet 5200n", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet 5200l", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "43500" }, { "model": "laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "43450" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "42500" }, { "model": "laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "42400" }, { "model": "ds9250c digital sender", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet enterprise cp4525", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "color laserjet cp6015", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet cp3505", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet cm3530", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet 9500mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "color laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5550" }, { "model": "color laserjet mfp", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "47300" }, { "model": "color laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "47000" }, { "model": "color laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3800" }, { "model": "color laserjet", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3000" }, { "model": "color laserjet m3530 multifunction printer", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "05.058.4" }, { "model": "color laserjet cp3525 printer", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "05.058.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "BID", "id": "59511" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_9500_mfp:c8549a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cm6030_mfp:ce664a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4240:q7785a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4250:q5400a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_9050:q7697a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_9050_mfp:q3721a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m5035_mfp:q7829a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m9040_mpf:cc394a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_4730_mfp:cb480a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_5550:q3714a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_enterprise_cp4025:cc490a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_enterprise_cp4525:cc493a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_9040:q7697a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_9040_mfp:q3721a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m4345_mfp:cb425a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m5025_mfp:q7840a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:digital_sender_9250c:cb472a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_3000:q7534a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cm6040_mfp:q3939a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cp3505:cb442a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4345_mfp:q3942a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_4350:q5407a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_enterprise_p3015:ce526a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m3027_mfp:cb416a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m9050_mpf:cc395a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_p3005:q7812a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_p4014:cb507a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_3800:q5981a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_4700:q7492a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cp3525:cc469a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cp4005:cb503a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:color_laserjet_cp6015:q3932a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_5200l:q7543a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_5200n:q7543a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m3035_mfp:cb414a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_m3035_mfp:cc519a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_p4015:cb509a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:hp:laserjet_p4515:cb514a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-5221" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "V-bxys4j4rnm via iDefense", "sources": [ { "db": "BID", "id": "59511" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ], "trust": 0.9 }, "cve": "CVE-2012-5221", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2012-5221", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2013-04548", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-5221", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2013-04548", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201304-581", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-5221", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the PostScript Interpreter, as used on the HP LaserJet 4xxx, 5200, 90xx, M30xx, M4345, M50xx, M90xx, P3005, and P4xxx; LaserJet Enterprise P3015; Color LaserJet 3xxx, 47xx, 5550, 9500, CM60xx, CP35xx, CP4005, and CP6015; Color LaserJet Enterprise CP4xxx; and 9250c Digital Sender with model-dependent firmware through 52.x allows remote attackers to read arbitrary files via unknown vectors. HP LaserJet Printers is a family of laser printers developed by Hewlett Packard. Multiple HP Laser Printer products have security vulnerabilities that allow remote attackers to exploit vulnerabilities to bypass certain security restrictions and access certain files. \nRemote attackers can exploit this issue to gain access to sensitive information that may aid in further attacks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03744742\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03744742\nVersion: 3\n\nHPSBPI02869 SSRT100936 rev.3 - HP LaserJet MFP Printers, HP Color LaserJet\nMFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to\nFiles\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \nThe vulnerability could be exploited remotely to gain unauthorized access to\nfiles. \n\nReferences: CVE-2012-5221, iDefense [V-bxys4j4rnm], SSRT100936\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nPlease refer to the RESOLUTION\n below for a list of impacted products . \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-5221 (AV:N/AC:L/Au:N/C:C/I:N/A:N) 7.8\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks Andrei Costin working with the iDefense\nVulnerability Contributor Program for reporting this vulnerability to\nsecurity-alert@hp.com. \n\nRESOLUTION\nHP recommends following the HP Imaging and Printing Security Best Practices\navailable at http://h71028.www7.hp.com/enterprise/downloads/HP-Imaging10.pdf\n. Page 51 documents how to disable file access via Postscript. \n\nIn addition, HP has provided firmware updates that address this potential\nvulnerability. Please see the table below. To obtain the updated firmware, go\nto www.hp.com and follow the below steps to obtain the firmware Update. \n\nObtain the firmware update from www.hp.com :\n\nSelect \"Drivers \u0026 Software\". \nEnter the product name listed in the table below into the search field. \nClick on \"Search\". \nClick on the appropriate product. \nUnder \"Select operating system\" click on \"Cross operating system (BIOS,\nFirmware, Diagnostics, etc.)\" Note: If the \"Cross operating system ...\" link\nis not present, select any Windows operating system from the list. \nSelect the appropriate firmware update under \"Firmware\". Note use the\nfirmware version listed or a more recent version, one that has a higher\nrevision number. \n\nFirmware Updates Product Name\n Model\n Firmware Update Version\n\nHP Color LaserJet 3000\n Q7534A\n v 46.070.1 (or higher)\n\nHP Color LaserJet 3800\n Q5981A\n v 46.070.1 (or higher)\n\nHP Color LaserJet 4700\n Q7492A\n v 46.220.1 (or higher)\n\nHP Color LaserJet 4730 Multifunction Printer\n Q7517A\n v 46.370.1 (or higher)\n\nHP Color LaserJet CM4730 Multifunction Printer\n CB480A\n v 50.272.8 (or higher)\n\nHP Color LaserJet 5550\n Q3714A\n v 07.220.1 (or higher)\n\nHP Color LaserJet 9500 Multifunction Printer\n C8549A\n v 08.280.1 (or higher)\n\nHP Color LaserJet CM6030 Multifunction Printer\n CE664A\n v 52.243.0 (or higher)\n\nHP Color LaserJet CM6040 Multifunction Printer\n Q3939A\n v 52.243.0 (or higher)\n\nHP Color LaserJet CP3505\n CB442A\n v 03.150.1 (or higher)\n\nHP Color LaserJet CP3525\n CC469A\n v 06.171.2 (or higher)\n\nHP Color LaserJet CP4005\n CB503A\n v 46.220.1 (or higher)\n\nHP Color LaserJet CP6015\n Q3932A\n v 04.191.2 (or higher)\n\nHP Color LaserJet Enterprise CP4025\n CC490A\n v 07.151.3 (or higher)\n\nHP Color LaserJet Enterprise CP4525\n CC493A\n v 07.151.3 (or higher)\n\nHP LaserJet 4240\n Q7785A\n v 08.240.1 (or higher)\n\nHP LaserJet 4250\n Q5400A\n v 08.240.1 (or higher)\n\nHP LaserJet 4345 Multifunction Printer\n Q3942A\n v 09.290.1 (or higher)\n\nHP LaserJet 4350\n Q5407A\n v 08.240.1 (or higher)\n\nHP LaserJet 5200L\n Q7543A\n v 08.220.8 (or higher)\n\nHP LaserJet 5200N\n Q7543A\n v 08.220.8 (or higher)\n\nHP LaserJet 9040\n Q7697A\n v 08.240.2 (or higher)\n\nHP LaserJet 9040 Multifunction Printer\n Q3721A\n v 08.280.1 (or higher)\n\nHP LaserJet 9050\n Q7697A\n v 08.240.2 (or higher)\n\nHP LaserJet 9050 Multifunction Printer\n Q3721A\n v 08.280.1 (or higher)\n\nHP LaserJet Enterprise P3015\n CE526A\n v 07.171.2 (or higher)\n\nHP LaserJet M3027 Multifunction Printer\n CB416A\n v 48.292.8 (or higher)\n\nHP LaserJet M3035 Multifunction Printer\n CB414A\n v 48.292.8 (or higher)\n\nHP LaserJet CM3530 Multifunction Printer\n CC519A\n v 53.222.8 (or higher)\n\nHP LaserJet M4345 Multifunction Printer\n CB425A\n v 48.292.8 (or higher)\n\nHP LaserJet M5025 Multifunction Printer\n Q7840A\n v 48.292.8 (or higher)\n\nHP LaserJet M5035 Multifunction Printer\n Q7829A\n v 48.292.8 (or higher)\n\nHP LaserJet M9040 Multifunction Printer\n CC394A\n v 51.242.7 (or higher)\n\nHP LaserJet M9050 Multifunction Printer\n CC395A\n v 51.242.7 (or higher)\n\nHP LaserJet P3005\n Q7812A\n v 02.180.1 (or higher)\n\nHP LaserJet P4014\n CB507A\n v 04.201.2 (or higher)\n\nHP LaserJet P4015\n CB509A\n v 04.201.2 (or higher)\n\nHP LaserJet P4515\n CB514A\n v 04.201.2 (or higher)\n\nHP 9250c Digital Sender\n CB472A\n v 48.282.8 (or higher)\n\nHISTORY\nVersion:1 (rev.1) - 25 April 2013 Initial release\nVersion:2 (rev.2) - 29 May 2013 Added a work around, added CM3530 printer,\nadded a CM4730 printer, changed firmware version on CP3525, CM6030, CM6040\nprinters, changed model numbers for 9050 printer, added leading \u00270\u0027 to all\nfirmware versions whose major version was a single digit. Merged \u0027Supported\nSoftware Versions\u0027 table, into \u0027Resolution\u0027 table. \nVersion:3 (rev.3) - 20 February 2014 Updated firmware versions in \u0027Supported\nSoftware Versions\u0027 table, clarified Resolution instructions. \n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlMGKroACgkQ4B86/C0qfVlS8gCcDgxsY8t4pERTC03RMDZbJBvm\nW4kAn3OHeoC8tSpppNV6haPe4+bwz+ro\n=oxhf\n-----END PGP SIGNATURE-----\n. Alternatively, to use the work around, please follow the steps in the\n\u0027work around\u0027", "sources": [ { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "BID", "id": "59511" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "PACKETSTORM", "id": "121449" }, { "db": "PACKETSTORM", "id": "125434" }, { "db": "PACKETSTORM", "id": "121827" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-5221", "trust": 3.7 }, { "db": "BID", "id": "59511", "trust": 1.5 }, { "db": "SECUNIA", "id": "53220", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2013-002518", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2013-04548", "trust": 0.6 }, { "db": "HP", "id": "HPSBPI02869", "trust": 0.6 }, { "db": "HP", "id": "SSRT100936", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201304-581", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2012-5221", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121449", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125434", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121827", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "BID", "id": "59511" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "PACKETSTORM", "id": "121449" }, { "db": "PACKETSTORM", "id": "125434" }, { "db": "PACKETSTORM", "id": "121827" }, { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "id": "VAR-201304-0028", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" } ], "trust": 1.3977605183333335 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" } ] }, "last_update_date": "2023-12-18T12:58:09.052000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBPI02869 SSRT100936", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c03744742" }, { "title": "Multiple HP LaserJet Printers Information Disclosure Vulnerability Patches", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/33700" }, { "title": "HP: HPSBPI02869 SSRT100936 rev.4 - HP LaserJet MFP Printers, HP Color LaserJet MFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to Files", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbpi02869" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI02869 SSRT100936 rev.4 - HP LaserJet MFP Printers, HP Color LaserJet MFP Printers, Certain HP LaserJet Printers, Remote Unauthorized Access to Files", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=b9eafb6f3872de879c3b5af0d15d953c" }, { "title": "", "trust": 0.1, "url": "https://github.com/aredspy/hpcreddumper " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-5221" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03744742" }, { "trust": 1.1, "url": "http://www.verisigninc.com/en_us/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=1023" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5221" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5221" }, { "trust": 0.6, "url": "http://www.secunia.com/advisories/53220/" }, { "trust": 0.6, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03744742" }, { "trust": 0.6, "url": "http://www.hp.com" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53220" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/59511" }, { "trust": 0.3, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5221" }, { "trust": 0.2, "url": "http://h71028.www7.hp.com/enterprise/downloads/hp-imaging10.pdf" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/aredspy/hpcreddumper" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://support.hp.com/us-en/document/c03744742" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "BID", "id": "59511" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "PACKETSTORM", "id": "121449" }, { "db": "PACKETSTORM", "id": "125434" }, { "db": "PACKETSTORM", "id": "121827" }, { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-04548" }, { "db": "VULMON", "id": "CVE-2012-5221" }, { "db": "BID", "id": "59511" }, { "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "db": "PACKETSTORM", "id": "121449" }, { "db": "PACKETSTORM", "id": "125434" }, { "db": "PACKETSTORM", "id": "121827" }, { "db": "NVD", "id": "CVE-2012-5221" }, { "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-29T00:00:00", "db": "CNVD", "id": "CNVD-2013-04548" }, { "date": "2013-04-29T00:00:00", "db": "VULMON", "id": "CVE-2012-5221" }, { "date": "2013-04-26T00:00:00", "db": "BID", "id": "59511" }, { "date": "2013-05-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "date": "2013-04-29T23:33:24", "db": "PACKETSTORM", "id": "121449" }, { "date": "2014-02-26T22:37:23", "db": "PACKETSTORM", "id": "125434" }, { "date": "2013-05-30T23:33:00", "db": "PACKETSTORM", "id": "121827" }, { "date": "2013-04-29T21:55:00.997000", "db": "NVD", "id": "CVE-2012-5221" }, { "date": "2013-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-29T00:00:00", "db": "CNVD", "id": "CNVD-2013-04548" }, { "date": "2013-12-31T00:00:00", "db": "VULMON", "id": "CVE-2012-5221" }, { "date": "2014-01-25T08:05:00", "db": "BID", "id": "59511" }, { "date": "2013-05-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002518" }, { "date": "2013-12-31T04:19:32.537000", "db": "NVD", "id": "CVE-2012-5221" }, { "date": "2013-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-581" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-581" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural HP Vulnerability to read arbitrary file in firmware of laser printer", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-581" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.