Vulnerabilites related to printerlogic - print_management
Vulnerability from fkie_nvd
Published
2019-05-08 15:30
Modified
2024-11-21 04:51
Severity ?
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/108285 | Broken Link | |
cret@cert.org | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108285 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | print_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:print_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "092E9A95-4811-4796-8B18-24BF4F0EEE1D", "versionEndIncluding": "18.3.1.96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges." }, { "lang": "es", "value": "El programa PrinterLogic Print Management, versiones hasta 18.3.1.96 incluyedola, no hace saneamiento de los caracteres especiales que admiten cambios remotos no autorizados a los archivos de configuraci\u00f3n. Un atacante no identificado puede ejecutar de forma remota un c\u00f3digo arbitrario con privilegios SYSTEM." } ], "id": "CVE-2019-9505", "lastModified": "2024-11-21T04:51:44.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-08T15:30:54.877", "references": [ { "source": "cret@cert.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/108285" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/108285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-159" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-08 15:30
Modified
2024-11-21 04:08
Severity ?
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/108285 | ||
cret@cert.org | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108285 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | print_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:print_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "092E9A95-4811-4796-8B18-24BF4F0EEE1D", "versionEndIncluding": "18.3.1.96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal\u0027s SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host." }, { "lang": "es", "value": "El programa PrinterLogic Print Management, hasta la versi\u00f3n 18.3.1.96 incluyendola, no v\u00e1lida, o v\u00e1lida incorrectamente, el certificado SSL del portal de administraci\u00f3n de PrinterLogic. Cuando un certificado no es v\u00e1lido o es malicioso, podr\u00eda permitir a un atacante falsificar una entidad de confianza mediante el uso de un ataque de tipo man-in the-middel (MITM). El programa puede conectarse a un host malicioso mientras cree que es un host de confianza, o el programa puede ser burlado para aceptar datos falsificados que parecen provenir de un host de confianza." } ], "id": "CVE-2018-5408", "lastModified": "2024-11-21T04:08:45.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-08T15:30:52.987", "references": [ { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/108285" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-08 15:30
Modified
2024-11-21 04:08
Severity ?
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/108285 | ||
cret@cert.org | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108285 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/169249/ | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | print_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:print_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "092E9A95-4811-4796-8B18-24BF4F0EEE1D", "versionEndIncluding": "18.3.1.96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit." }, { "lang": "es", "value": "El programa PrinterLogic Print Management, hasta la versi\u00f3n 18.3.1.96 incluyendola, actualiza y ejecuta el c\u00f3digo sin comprobar suficientemente el origen y la integridad del c\u00f3digo. Un atacante puede ejecutar c\u00f3digo malicioso al comprometer el servidor host, realizar una falsificaci\u00f3n de DNS o modificar el c\u00f3digo en tr\u00e1nsito." } ], "id": "CVE-2018-5409", "lastModified": "2024-11-21T04:08:45.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-08T15:30:53.063", "references": [ { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/108285" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/169249/" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-494" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-9505 (GCVE-0-2019-9505)
Vulnerability from cvelistv5
Published
2019-05-08 14:48
Modified
2024-08-04 21:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-159 - Failure to Sanitize Special Element
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PrinterLogic | Management Software |
Version: 8.3.1.96 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108285" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Management Software", "vendor": "PrinterLogic", "versions": [ { "lessThanOrEqual": "8.3.1.96", "status": "affected", "version": "8.3.1.96", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-159", "description": "CWE-159 Failure to Sanitize Special Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-10T16:06:05", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108285" } ], "source": { "discovery": "UNKNOWN" }, "title": "PrinterLogic Print Management Software does not sanitize special characters", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9505", "STATE": "PUBLIC", "TITLE": "PrinterLogic Print Management Software does not sanitize special characters" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Management Software", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.3.1.96", "version_value": "8.3.1.96" } ] } } ] }, "vendor_name": "PrinterLogic" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-159 Failure to Sanitize Special Element" } ] } ] }, "references": { "reference_data": [ { "name": "VU#", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108285" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2019-9505", "datePublished": "2019-05-08T14:48:20", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5408 (GCVE-0-2018-5408)
Vulnerability from cvelistv5
Published
2019-05-08 14:48
Modified
2024-08-05 05:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal's SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PrinterLogic | Management Software |
Version: 8.3.1.96 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108285" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Management Software", "vendor": "PrinterLogic", "versions": [ { "lessThanOrEqual": "8.3.1.96", "status": "affected", "version": "8.3.1.96", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal\u0027s SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-10T16:06:05", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108285" } ], "source": { "discovery": "UNKNOWN" }, "title": "PrinterLogic Print Management Software fails to validate the management portal SSL certificates", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5408", "STATE": "PUBLIC", "TITLE": "PrinterLogic Print Management Software fails to validate the management portal SSL certificates" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Management Software", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.3.1.96", "version_value": "8.3.1.96" } ] } } ] }, "vendor_name": "PrinterLogic" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not validate, or incorrectly validates, the PrinterLogic management portal\u0027s SSL certificate. When a certificate is invalid or malicious, it might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. The software might connect to a malicious host while believing it is a trusted host, or the software might be deceived into accepting spoofed data that appears to originate from a trusted host." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "VU#", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108285" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2018-5408", "datePublished": "2019-05-08T14:48:20", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-08-05T05:33:44.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5409 (GCVE-0-2018-5409)
Vulnerability from cvelistv5
Published
2019-05-08 14:48
Modified
2024-08-05 05:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-494 - Download of Code Without Integrity Check
Summary
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PrinterLogic | Management Software |
Version: 8.3.1.96 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108285" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Management Software", "vendor": "PrinterLogic", "versions": [ { "lessThanOrEqual": "8.3.1.96", "status": "affected", "version": "8.3.1.96", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-494", "description": "CWE-494 Download of Code Without Integrity Check", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-10T16:06:05", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108285" } ], "source": { "discovery": "UNKNOWN" }, "title": "PrinterLogic Print Management Software updates and executes the code without origin and code verification", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5409", "STATE": "PUBLIC", "TITLE": "PrinterLogic Print Management Software updates and executes the code without origin and code verification" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Management Software", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.3.1.96", "version_value": "8.3.1.96" } ] } } ] }, "vendor_name": "PrinterLogic" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PrinterLogic Print Management software, versions up to and including 18.3.1.96, updates and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-494 Download of Code Without Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "VU#", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/169249/" }, { "name": "108285", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108285" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2018-5409", "datePublished": "2019-05-08T14:48:20", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-08-05T05:33:44.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }