ID

VAR-201808-0972


CVE

CVE-2018-5924


TITLE

HP Inkjet printer buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-009355

DESCRIPTION

A security vulnerability has been identified with certain HP Inkjet printers. A maliciously crafted file sent to an affected device can cause a stack buffer overflow, which could allow remote code execution. HP Inkjet printers contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple HP printers are prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.. Failed exploit attempts will result in denial-of-service conditions. HP Pagewide Pro, etc. are all printers from Hewlett-Packard (HP) in the United States. A stack-based buffer overflow vulnerability exists in many HP products. The vulnerability stems from the fact that the program does not correctly perform boundary detection on the data submitted by the user, causing the size of the copied data to exceed the buffer space. The following products are affected: HP Pagewide Pro; DesignJet; OfficeJet; DeskJet; Envy

Trust: 2.61

sources: NVD: CVE-2018-5924 // JVNDB: JVNDB-2018-009355 // CNVD: CNVD-2018-14730 // BID: 105010 // VULHUB: VHN-135956 // VULMON: CVE-2018-5924

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-14730

AFFECTED PRODUCTS

vendor:hpmodel:a9u28bscope:eqversion:1828b

Trust: 1.6

vendor:hpmodel:d4h24bscope:eqversion:1826a

Trust: 1.6

vendor:hpmodel:t8x44scope:eqversion:1828a

Trust: 1.6

vendor:hpmodel:3aw51ascope:eqversion:1828a

Trust: 1.6

vendor:hpmodel:v1n08ascope:eqversion:1828a

Trust: 1.6

vendor:hpmodel:y5h80ascope:eqversion:1828a

Trust: 1.6

vendor:hpmodel:d3a82ascope:eqversion:1828b

Trust: 1.6

vendor:hpmodel:k4u04bscope:eqversion:1829a

Trust: 1.6

vendor:hpmodel:k4t99bscope:eqversion:1829a

Trust: 1.6

vendor:hpmodel:f5s57ascope:eqversion:1829a

Trust: 1.6

vendor:hpmodel:d9l63ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:d7z36ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:1dt61ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:e2d42ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cz993ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:d4j74scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:k7s37ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:3yz74ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q21dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cq176scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:k7g93ascope:eqversion:1737j

Trust: 1.0

vendor:hpmodel:k9t01scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:j9v80bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:j6u55bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:g0v48cscope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:j7k33ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j6u55ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cq893cscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:cr771ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:g5j38ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:y3z44scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:w1b39scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:j6u63scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:d3q20dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cq891bscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:b9s76scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:z6z97ascope:eqversion:1805j

Trust: 1.0

vendor:hpmodel:v1n01ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j9v82ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:d3q15dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:x3b09ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cm750ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cq183ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:m2u76scope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:m2u91scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cn459ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f5s43scope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:t8w35ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:e3e02ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q21cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:l9b95ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:t5d66ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:f5s60ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:d4h25ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:t1p36scope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:d3q17dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cn577ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q15bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cn583ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:v6d27scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j5t77ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f5r95scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:f1j00scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:f0m65ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q19dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:n4l18cscope:eqversion:1826a

Trust: 1.0

vendor:hpmodel:2nd31ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:d3q15ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:b9s57cscope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:1sh08scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:k7g18ascope:eqversion:1829d

Trust: 1.0

vendor:hpmodel:j9v82bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:m2u75scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f0v67scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:j9v82cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:w1b38scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:j6u55dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:d3q17cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cn461ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:a7f66ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:t0g54ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:w3u25scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f5r96ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:cq891ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f5s65ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:m2u85scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t0k98ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:m9l73ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:w1b37scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:e4w43scope:eqversion:1829d

Trust: 1.0

vendor:hpmodel:t5d67ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:k9v76scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:cz283ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:e3e03ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:cz294ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:d9l64ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:d3q16ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:z4b56ascope:eqversion:1805j

Trust: 1.0

vendor:hpmodel:cq893arscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:k9u05bscope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cr769ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:t0g50ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:a9t80bscope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:m2u86scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3a78bscope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:w1b31scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:j7a31ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j6x80ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cq890bscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:g0v47scope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:k7s34ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:k9h48scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:cn216ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:j2d37ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:3aw44ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:g1w52ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f1h96scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:y0s19ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t0a23ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:b4l08ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:z6z95ascope:eqversion:1805j

Trust: 1.0

vendor:hpmodel:cx017ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:cm749ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:l8l91ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cq761ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f8b04ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:j6u57bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cq890dscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:cz292ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:a9t80ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:w1b33scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:p4c78ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f8b05ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:j9v86ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t0f29ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:y3z46scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:d3q20cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:t0g70ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:cz282ascope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:t6t77ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:cn460ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:k7v42cscope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cq176ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f9d36scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:z4b07ascope:eqversion:1737j

Trust: 1.0

vendor:hpmodel:d3q16bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cq893escope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:a9j41scope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:f8b06ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:k7v35scope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cq893bscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:z6z11ascope:eqversion:1805j

Trust: 1.0

vendor:hpmodel:e1d34ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t0g45ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:y5z00ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:y3z45scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:g3j47ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:g0450scope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:w3u23scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:cn581ascope:eqversion:1827d

Trust: 1.0

vendor:hpmodel:cz025ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:d3q19ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:f8b12ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:y3z54scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:z4a54scope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:d4h22ascope:eqversion:1826a

Trust: 1.0

vendor:hpmodel:k9z76ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:j9v87ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q20bscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cv037ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:n4l14cscope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:k7c84scope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:k9h57scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:b9s58ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:f5s00scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:1jl02ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:n4k99cscope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f9a29bscope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:z4b53ascope:eqversion:1737j

Trust: 1.0

vendor:hpmodel:t0g56ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:a9t89ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cq891arscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:m9l81ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f8b09scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:m9l70ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j3p68ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:f0v63scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:d4h21ascope:eqversion:1826a

Trust: 1.0

vendor:hpmodel:4uj28bscope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:e1d36ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d9l19ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q20ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:f9a29ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:a9u23scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cz284ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:j6u55cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:g0v48bscope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:b4l03scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:d4j85bscope:eqversion:1831a

Trust: 1.0

vendor:hpmodel:j9v82dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:f8b13ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:y3z57scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:c9s13ascope:eqversion:1827d

Trust: 1.0

vendor:hpmodel:g1x85ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:k7s42ascope:eqversion:1832a

Trust: 1.0

vendor:hpmodel:d9l20ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:z4b12scope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:d3q21ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cr7770ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:v1n02ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t8w51ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:1jl02bscope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:n9m07ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:d3p93ascope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:j6u69scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:l9d57ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cq893ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:a9j40ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:cz276ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:cz045ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:a9u19ascope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:k9z76dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cr768ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:d3q16dscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:t1p99scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d9l18ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t3p03ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:b9s56ascope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:cz293ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j7a28ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t0f28ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:p0r21ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cx042scope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:cz992ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:a7f64ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j9v80ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:j6u59scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:y0s18ascope:eqversion:1830a

Trust: 1.0

vendor:hpmodel:4sc29ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:f1h97scope:eqversion:1828b

Trust: 1.0

vendor:hpmodel:j7k34ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t3p04ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:k7g86scope:eqversion:1830b

Trust: 1.0

vendor:hpmodel:y3z47scope:eqversion:005.1828a

Trust: 1.0

vendor:hpmodel:cq890cscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:m2u81scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:cn598ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:cz152ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cn463ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:cq890arscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:cq891cscope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f9a28ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cq890ascope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:f9a28bscope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:a7f65ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d7z37ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:m9l65ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t8x39scope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:y5h60ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:d3q17ascope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:f0v64scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:m2q28ascope:eqversion:1829a

Trust: 1.0

vendor:hpmodel:cq890escope:eqversion:1829b

Trust: 1.0

vendor:hpmodel:t0g25ascope:eqversion:1827a

Trust: 1.0

vendor:hpmodel:n4l17ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:j6x76ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:m9l80ascope:eqversion:1828a

Trust: 1.0

vendor:hpmodel:t1q00scope:eqversion:1827b

Trust: 1.0

vendor:hpmodel:d3q16cscope:eqversion:001.1829a

Trust: 1.0

vendor:hpmodel:cv136ascope:eqversion:1829a

Trust: 1.0

vendor:hewlett packardmodel:t8x44scope: - version: -

Trust: 0.8

vendor:hpmodel:ink printersscope: - version: -

Trust: 0.6

vendor:hpmodel:smart tank wirelessscope:eqversion:4500

Trust: 0.3

vendor:hpmodel:photosmartscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 552dw d3q17dscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 552dw d3q17cscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 552dw d3q17ascope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 452dn d3q15dscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 452dn d3q15bscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide pro 452dn d3q15ascope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed p55250dw j6u55dscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed p55250dw j6u55cscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed p55250dw j6u55ascope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed p55250dw j6u55bscope: - version: -

Trust: 0.3

vendor:hpmodel:pagewide managed mfp p57750dw j9v82dscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed mfp p57750dw j9v82cscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed mfp p57750dw j9v82bscope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide managed mfp p57750dw j9v82ascope:eqversion:0

Trust: 0.3

vendor:hpmodel:pagewide 352dw j6u57bscope:eqversion:0

Trust: 0.3

vendor:hpmodel:officejetscope:eqversion:0

Trust: 0.3

vendor:hpmodel:ink tankscope:eqversion:3100

Trust: 0.3

vendor:hpmodel:envyscope:eqversion:55300

Trust: 0.3

vendor:hpmodel:envyscope:eqversion:45200

Trust: 0.3

vendor:hpmodel:envyscope:eqversion:45000

Trust: 0.3

vendor:hpmodel:envyscope:eqversion:1200

Trust: 0.3

vendor:hpmodel:deskjetscope:eqversion:0

Trust: 0.3

vendor:hpmodel:designjetscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2018-14730 // BID: 105010 // JVNDB: JVNDB-2018-009355 // CNNVD: CNNVD-201808-245 // NVD: CVE-2018-5924

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-5924
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-5924
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-14730
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201808-245
value: CRITICAL

Trust: 0.6

VULHUB: VHN-135956
value: HIGH

Trust: 0.1

VULMON: CVE-2018-5924
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-5924
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-14730
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-135956
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-5924
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-14730 // VULHUB: VHN-135956 // VULMON: CVE-2018-5924 // JVNDB: JVNDB-2018-009355 // CNNVD: CNNVD-201808-245 // NVD: CVE-2018-5924

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-135956 // JVNDB: JVNDB-2018-009355 // NVD: CVE-2018-5924

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-245

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201808-245

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-009355

PATCH

title:HPSBHF03589url:https://support.hp.com/us-en/document/c06097712

Trust: 0.8

title:Patch for HPInkPrinters Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/136615

Trust: 0.6

title:Multiple HP Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83962

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2018/08/03/hp_printer_malware/

Trust: 0.2

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03589 rev. 5 - HP Ink Printers Remote Code Executionurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=ffded7fe093cb3f89bebca73d54f2e4a

Trust: 0.1

title:HP: HPSBHF03589 rev. 5 - HP Ink Printers Remote Code Executionurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03589

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03589 rev. 5 - HP Ink Printers Remote Code Executionurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=0759e610b0d83e2d5bd45d19170fabfc

Trust: 0.1

title:Exp101tsArchiv30thersurl:https://github.com/nu11secur1ty/Exp101tsArchiv30thers

Trust: 0.1

title: - url:https://github.com/lnick2023/nicenice

Trust: 0.1

title:awesome-cve-poc_qazbnm456url:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:Threatposturl:https://threatpost.com/pewdiepie-hackers-launch-second-printer-siege-according-to-reports/139968/

Trust: 0.1

title:Threatposturl:https://threatpost.com/youtuber-pewdiepie-promoted-via-50k-hacked-printers/139538/

Trust: 0.1

title:Threatposturl:https://threatpost.com/old-printer-vulnerabilities-die-hard/139318/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/vulnerabilities-in-fax-protocol-let-hackers-infiltrate-networks-via-fax-machines/

Trust: 0.1

sources: CNVD: CNVD-2018-14730 // VULMON: CVE-2018-5924 // JVNDB: JVNDB-2018-009355 // CNNVD: CNNVD-201808-245

EXTERNAL IDS

db:NVDid:CVE-2018-5924

Trust: 3.5

db:BIDid:105010

Trust: 2.1

db:SECTRACKid:1041415

Trust: 1.8

db:JVNDBid:JVNDB-2018-009355

Trust: 0.8

db:CNNVDid:CNNVD-201808-245

Trust: 0.7

db:CNVDid:CNVD-2018-14730

Trust: 0.6

db:VULHUBid:VHN-135956

Trust: 0.1

db:VULMONid:CVE-2018-5924

Trust: 0.1

sources: CNVD: CNVD-2018-14730 // VULHUB: VHN-135956 // VULMON: CVE-2018-5924 // BID: 105010 // JVNDB: JVNDB-2018-009355 // CNNVD: CNNVD-201808-245 // NVD: CVE-2018-5924

REFERENCES

url:https://support.hp.com/us-en/document/c06097712

Trust: 2.8

url:http://www.securityfocus.com/bid/105010

Trust: 1.9

url:https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/

Trust: 1.8

url:http://www.securitytracker.com/id/1041415

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5924

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-5924

Trust: 0.8

url:http://www.hp.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/old-printer-vulnerabilities-die-hard/139318/

Trust: 0.1

sources: CNVD: CNVD-2018-14730 // VULHUB: VHN-135956 // VULMON: CVE-2018-5924 // BID: 105010 // JVNDB: JVNDB-2018-009355 // CNNVD: CNNVD-201808-245 // NVD: CVE-2018-5924

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 105010

SOURCES

db:CNVDid:CNVD-2018-14730
db:VULHUBid:VHN-135956
db:VULMONid:CVE-2018-5924
db:BIDid:105010
db:JVNDBid:JVNDB-2018-009355
db:CNNVDid:CNNVD-201808-245
db:NVDid:CVE-2018-5924

LAST UPDATE DATE

2024-11-23T22:26:14.273000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-14730date:2018-08-07T00:00:00
db:VULHUBid:VHN-135956date:2020-08-24T00:00:00
db:VULMONid:CVE-2018-5924date:2020-08-24T00:00:00
db:BIDid:105010date:2018-08-01T00:00:00
db:JVNDBid:JVNDB-2018-009355date:2018-11-16T00:00:00
db:CNNVDid:CNNVD-201808-245date:2020-08-25T00:00:00
db:NVDid:CVE-2018-5924date:2024-11-21T04:09:43.097

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-14730date:2018-08-07T00:00:00
db:VULHUBid:VHN-135956date:2018-08-13T00:00:00
db:VULMONid:CVE-2018-5924date:2018-08-13T00:00:00
db:BIDid:105010date:2018-08-01T00:00:00
db:JVNDBid:JVNDB-2018-009355date:2018-11-16T00:00:00
db:CNNVDid:CNNVD-201808-245date:2018-08-08T00:00:00
db:NVDid:CVE-2018-5924date:2018-08-13T15:29:00.233