Lucene search

K
cve[email protected]CVE-2019-10627
HistoryNov 21, 2019 - 3:15 p.m.

CVE-2019-10627

2019-11-2115:15:13
CWE-119
CWE-190
CWE-131
web.nvd.nist.gov
35
cve
2019
10627
integer overflow
buffer overflow
vulnerability
postscript
pdf
image handling
ips
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.5%

Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2

Affected configurations

NVD
Node
qualcommipsRange<2019.2
Node
hpd9l63aMatch-
AND
hpd9l63a_firmwareRange<001.1937c
Node
hpd9l64aMatch-
AND
hpd9l64a_firmwareRange<001.1937c
Node
hpt0g70aMatch-
AND
hpt0g70a_firmwareRange<001.1937c
Node
hpj3p65aMatch-
AND
hpj3p65a_firmwareRange<001.1937c
Node
hpj3p68aMatch-
AND
hpj3p68a_firmwareRange<001.1937c
Node
hpj6u57aMatch-
AND
hpj6u57a_firmwareRange<001.1937d
Node
hpj6u57bMatch-
AND
hpj6u57b_firmwareRange<001.1937d
Node
hpj9v80aMatch-
AND
hpj9v80a_firmwareRange<001.1937d
Node
hpj9v80b_firmwareRange<001.1937d
AND
hpj9v80bMatch-
Node
hpj6u55a_firmwareRange<001.1937d
AND
hpj6u55aMatch-
Node
hpj6u55d_firmwareRange<001.1937d
AND
hpj6u55dMatch-
Node
hpj6u51b_firmwareRange<001.1937d
AND
hpj6u51bMatch-
Node
hpj9v82a_firmwareRange<001.1937d
AND
hpj9v82aMatch-
Node
hpj9v82d_firmwareRange<001.1937d
AND
hpj9v82dMatch-
Node
hpj9v78b_firmwareRange<001.1937d
AND
hpj9v78bMatch-
Node
hpd3q15a_firmwareRange<001.1937d
AND
hpd3q15aMatch-
Node
hpd3q15b_firmwareRange<001.1937d
AND
hpd3q15bMatch-
Node
hpd3q15d_firmwareRange<001.1937d
AND
hpd3q15dMatch-
Node
hpd3q16a_firmwareRange<001.1937d
AND
hpd3q16aMatch-
Node
hpd3q16d_firmwareRange<001.1937d
AND
hpd3q16dMatch-
Node
hpw2z52b_firmwareRange<001.1937d
AND
hpw2z52bMatch-
Node
hpd3q19a_firmwareRange<001.1937d
AND
hpd3q19aMatch-
Node
hpd3q19b_firmwareRange<001.1937d
AND
hpd3q19bMatch-
Node
hpd3q19d_firmwareRange<001.1937d
AND
hpd3q19dMatch-
Node
hpd3q20a_firmwareRange<001.1937d
AND
hpd3q20aMatch-
Node
hpd3q20b_firmwareRange<001.1937d
AND
hpd3q20bMatch-
Node
hpd3q20c_firmwareRange<001.1937d
AND
hpd3q20cMatch-
Node
hpd3q20d_firmwareRange<001.1937d
AND
hpd3q20dMatch-
Node
hpw2z53b_firmwareRange<001.1937d
AND
hpw2z53bMatch-
Node
hp2dr21d_firmwareRange<001.1937d
AND
hp2dr21dMatch-
Node
hpd3q17a_firmwareRange<001.1937d
AND
hpd3q17aMatch-
Node
hpd3q17d_firmwareRange<001.1937d
AND
hpd3q17dMatch-
Node
hpk9z74a_firmwareRange<001.1937d
AND
hpk9z74aMatch-
Node
hpk9z74d_firmwareRange<001.1937d
AND
hpk9z74dMatch-
Node
hpd3q21a_firmwareRange<001.1937d
AND
hpd3q21aMatch-
Node
hpd3q21b_firmwareRange<001.1937d
AND
hpd3q21bMatch-
Node
hpd3q21c_firmwareRange<001.1937d
AND
hpd3q21cMatch-
Node
hpd3q21d_firmwareRange<001.1937d
AND
hpd3q21dMatch-
Node
hpk9z76a_firmwareRange<001.1937d
AND
hpk9z76aMatch-
Node
hpk9z76b_firmwareRange<001.1937d
AND
hpk9z76bMatch-
Node
hpk9z76d_firmwareRange<001.1937d
AND
hpk9z76dMatch-
CPENameOperatorVersion
qualcomm:ipsqualcomm ipslt2019.2

CNA Affected

[
  {
    "product": "PostScript and PDF printers that use IPS versions prior to 2019.2",
    "vendor": "Qualcomm, Inc.",
    "versions": [
      {
        "status": "affected",
        "version": "PostScript and PDF printers that use IPS versions prior to 2019.2"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.5%

Related for CVE-2019-10627