CVE-2013-6427
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
09/12/2013
Last modified:
11/04/2025
Description
upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:b:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:a:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html
- http://openwall.com/lists/oss-security/2013/12/05/2
- http://www.debian.org/security/2013/dsa-2829
- http://www.ubuntu.com/usn/USN-2085-1
- https://bugzilla.novell.com/show_bug.cgi?id=853405
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html
- http://openwall.com/lists/oss-security/2013/12/05/2
- http://www.debian.org/security/2013/dsa-2829
- http://www.ubuntu.com/usn/USN-2085-1
- https://bugzilla.novell.com/show_bug.cgi?id=853405