9.8
CRITICAL
CVE-2019-10627
Adobe PostScript and PDF Printer Integer Overflow to Buffer Overflow Vulnerability
Description

Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2

INFO

Published Date :

Nov. 21, 2019, 3:15 p.m.

Last Modified :

Nov. 21, 2024, 4:19 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2019-10627 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Hp j6u57b_firmware
2 Hp j9v82a_firmware
3 Hp j9v82d_firmware
4 Hp j6u55a_firmware
5 Hp j6u55d_firmware
6 Hp j9v80a_firmware
7 Hp j9v80b_firmware
8 Hp d3q15a_firmware
9 Hp d3q15b_firmware
10 Hp d3q15d_firmware
11 Hp d3q17a_firmware
12 Hp d3q17d_firmware
13 Hp d3q19a_firmware
14 Hp d3q19d_firmware
15 Hp d3q20a_firmware
16 Hp d3q20b_firmware
17 Hp d3q20c_firmware
18 Hp d3q20d_firmware
19 Hp d3q21a_firmware
20 Hp d3q21c_firmware
21 Hp d3q21d_firmware
22 Hp k9z76a_firmware
23 Hp k9z76d_firmware
24 Hp d3q16a_firmware
25 Hp d3q16d_firmware
26 Hp d9l63a_firmware
27 Hp d9l64a_firmware
28 Hp t0g70a_firmware
29 Hp j3p68a_firmware
30 Hp j3p65a_firmware
31 Hp j6u57a_firmware
32 Hp j6u51b_firmware
33 Hp j9v78b_firmware
34 Hp w2z52b_firmware
35 Hp d3q19b_firmware
36 Hp w2z53b_firmware
37 Hp 2dr21d_firmware
38 Hp k9z74a_firmware
39 Hp k9z74d_firmware
40 Hp d3q21b_firmware
41 Hp k9z76b_firmware
42 Hp j9v82a
43 Hp j9v82d
44 Hp j6u55a
45 Hp j6u55d
46 Hp k9z76a
47 Hp k9z76d
48 Hp d3q17a
49 Hp d3q17d
50 Hp d3q21a
51 Hp d3q21c
52 Hp d3q21d
53 Hp d3q20a
54 Hp d3q20b
55 Hp d3q20c
56 Hp d3q20d
57 Hp d3q16a
58 Hp d3q16d
59 Hp d3q19a
60 Hp d3q19d
61 Hp d3q15a
62 Hp d3q15b
63 Hp d3q15d
64 Hp j9v80a
65 Hp j9v80b
66 Hp j6u57b
67 Hp d9l63a
68 Hp d9l64a
69 Hp t0g70a
70 Hp j3p68a
71 Hp j3p65a
72 Hp j6u57a
73 Hp j6u51b
74 Hp j9v78b
75 Hp w2z52b
76 Hp d3q19b
77 Hp w2z53b
78 Hp 2dr21d
79 Hp k9z74a
80 Hp k9z74d
81 Hp d3q21b
82 Hp k9z76b
1 Qualcomm ips
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2019-10627.

URL Resource
https://support.hp.com/us-en/document/c06458150 Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin Third Party Advisory
https://support.hp.com/us-en/document/c06458150 Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2019-10627 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2019-10627 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://support.hp.com/us-en/document/c06458150
    Added Reference https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Apr. 12, 2022

    Action Type Old Value New Value
    Changed Reference Type https://support.hp.com/us-en/document/c06458150 No Types Assigned https://support.hp.com/us-en/document/c06458150 Vendor Advisory
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d9l63a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937c OR cpe:2.3:h:hp:d9l63a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d9l64a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937c OR cpe:2.3:h:hp:d9l64a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:t0g70a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937c OR cpe:2.3:h:hp:t0g70a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j3p65a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937c OR cpe:2.3:h:hp:j3p65a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j3p68a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937c OR cpe:2.3:h:hp:j3p68a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j6u57a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j6u57a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j6u57b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j6u57b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j9v80a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j9v80a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j9v80b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j9v80b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j6u55a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j6u55a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j6u55d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j6u55d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j6u51b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j6u51b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j9v82a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j9v82a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j9v82d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j9v82d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:j9v78b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:j9v78b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q15a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q15a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q15b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q15b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q15d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q15d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q16a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q16a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q16d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q16d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w2z52b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:w2z52b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q19a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q19a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q19b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q19b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q19d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q19d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q20a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q20a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q20b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q20b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q20c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q20c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q20d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q20d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:w2z53b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:w2z53b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:2dr21d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:2dr21d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q17a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q17a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q17d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q17d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:k9z74a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:k9z74a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:k9z74d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:k9z74d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q21a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q21a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q21b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q21b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q21c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q21c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:d3q21d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:d3q21d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:k9z76a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:k9z76a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:k9z76b_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:k9z76b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:hp:k9z76d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 001.1937d OR cpe:2.3:h:hp:k9z76d:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Feb. 25, 2022

    Action Type Old Value New Value
    Added Reference https://support.hp.com/us-en/document/c06458150 [No Types Assigned]
  • CWE Remap by [email protected]

    Jul. 21, 2021

    Action Type Old Value New Value
    Changed CWE CWE-190 CWE-119 CWE-131 CWE-190
  • Initial Analysis by [email protected]

    Nov. 25, 2019

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/october-2019-bulletin Third Party Advisory
    Added CWE NIST CWE-190
    Added CPE Configuration OR *cpe:2.3:a:qualcomm:ips:*:*:*:*:*:*:*:* versions up to (excluding) 2019.2
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2019-10627 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.20 }} 0.02%

score

0.57645

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability