Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4504

Опубликовано: 20 сент. 2023
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

A vulnerability was found in CUPS and libppd, where a failure to validate the length provided in an attacker-crafted PPD PostScript document can lead to a heap-based buffer overflow, causing a denial of service or, in some cases, execute arbitrary code, depending on how the application processes untrusted PPD files.

Отчет

This vulnerability is rated as moderate because a heap-based buffer overflow in CUPS and libppd, caused by improper length validation in attacker-crafted PPD PostScript documents, could lead to application crashes or potential code execution, successful exploitation depends on specific conditions, such as the application's processing of untrusted PPD files, limiting the overall impact in most cases. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.

Меры по смягчению последствий

For a successful attack, the victim had to install a PPD file (driver) that contains the crafted PS sequence, which triggers the issue. It is not recommended to install drivers from unreliable sources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6cupsOut of support scope
Red Hat Enterprise Linux 7cupsOut of support scope
Red Hat Enterprise Linux 8cupsWill not fix
Red Hat Enterprise Linux 9cupsWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2238509libppd: Postscript Parsing Heap Overflow

EPSS

Процентиль: 9%
0.00036
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
почти 2 года назад

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

CVSS3: 7
nvd
почти 2 года назад

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

CVSS3: 7
msrc
около 1 года назад

Описание отсутствует

CVSS3: 7
debian
почти 2 года назад

Due to failure in validating the length provided by an attacker-crafte ...

CVSS3: 7.8
fstec
почти 2 года назад

Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 9%
0.00036
Низкий

7 High

CVSS3