HP.Sprinter.Tidestone.Formula.DefaultFontName.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Code Execution vulnerability in HP Sprinter.
The vulnerability is due to lack of validation for user supplied data when the vulnerable application handles a Tidestone activeX control. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious webpage and execute arbitrary code within the context of the targeted users' browser.

affected-products-logoAffected Products

HP Sprinter prior to v12.01

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04454636

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)