Описание
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
A vulnerability was found in CUPS and libppd, where a failure to validate the length provided in an attacker-crafted PPD PostScript document can lead to a heap-based buffer overflow, causing a denial of service or, in some cases, execute arbitrary code, depending on how the application processes untrusted PPD files.
Отчет
This vulnerability is rated as moderate because a heap-based buffer overflow in CUPS and libppd, caused by improper length validation in attacker-crafted PPD PostScript documents, could lead to application crashes or potential code execution, successful exploitation depends on specific conditions, such as the application's processing of untrusted PPD files, limiting the overall impact in most cases.
Меры по смягчению последствий
For a successful attack, the victim had to install a PPD file (driver) that contains the crafted PS sequence, which triggers the issue. It is not recommended to install drivers from unreliable sources.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | cups | Out of support scope | ||
| Red Hat Enterprise Linux 7 | cups | Out of support scope | ||
| Red Hat Enterprise Linux 8 | cups | Will not fix | ||
| Red Hat Enterprise Linux 9 | cups | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafte ...
Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
EPSS
7 High
CVSS3