Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47175

Опубликовано: 26 сент. 2024
Источник: redhat
CVSS3: 7.7
EPSS Средний

Описание

CUPS is a standards-based, open-source printing system, and libppd can be used for legacy PPD file support. The libppd function ppdCreatePPDFromIPP2 does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as cfGetPrinterAttributes5, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

A security issue was found in OpenPrinting CUPS. The function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer's capabilities (such as supported media sizes, resolutions, color modes, etc.). PPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way. The ppdCreatePPDFromIPP2 function in libppd doesn't properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.

Отчет

RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running. RHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to 'Low'

Меры по смягчению последствий

See the security bulletin for a detailed mitigation procedure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7cupsFix deferred
Red Hat OpenShift Container Platform 4rhcosNot affected
Red Hat Enterprise Linux 7.7 Advanced Update Supportcups-filtersFixedRHSA-2024:755102.10.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportcups-filtersFixedRHSA-2024:755302.10.2024
Red Hat Enterprise Linux 8cups-filtersFixedRHSA-2024:746301.10.2024
Red Hat Enterprise Linux 8cupsFixedRHSA-2025:008308.01.2025
Red Hat Enterprise Linux 8cupsFixedRHSA-2025:008308.01.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportcups-filtersFixedRHSA-2024:746101.10.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportcups-filtersFixedRHSA-2024:750402.10.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicecups-filtersFixedRHSA-2024:750402.10.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=2314256cups: libppd: remote command injection via attacker controlled data in PPD file

EPSS

Процентиль: 96%
0.28751
Средний

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
nvd
9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
debian
9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` c ...

rocky
5 месяцев назад

Low: cups security update

oracle-oval
5 месяцев назад

ELSA-2025-0083: cups security update (LOW)

EPSS

Процентиль: 96%
0.28751
Средний

7.7 High

CVSS3

Уязвимость CVE-2024-47175