Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47850

Опубликовано: 04 окт. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)

A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.

Отчет

CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.

Меры по смягчению последствий

See the security bulletin for a detailed mitigation procedure.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10cups-browsedAffected
Red Hat Enterprise Linux 7.7 Advanced Update Supportcups-filtersFixedRHSA-2024:755102.10.2024
Red Hat Enterprise Linux 7 Extended Lifecycle Supportcups-filtersFixedRHSA-2024:755302.10.2024
Red Hat Enterprise Linux 8cups-filtersFixedRHSA-2024:746301.10.2024
Red Hat Enterprise Linux 8.2 Advanced Update Supportcups-filtersFixedRHSA-2024:746101.10.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportcups-filtersFixedRHSA-2024:750402.10.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicecups-filtersFixedRHSA-2024:750402.10.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionscups-filtersFixedRHSA-2024:750402.10.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportcups-filtersFixedRHSA-2024:762303.10.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update Servicecups-filtersFixedRHSA-2024:762303.10.2024

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2316417cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack

EPSS

Процентиль: 39%
0.00171
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)

CVSS3: 7.5
nvd
10 месяцев назад

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)

CVSS3: 7.5
debian
10 месяцев назад

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an ar ...

suse-cvrf
10 месяцев назад

Security update for cups-filters

CVSS3: 7.5
github
10 месяцев назад

CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)

EPSS

Процентиль: 39%
0.00171
Низкий

7.5 High

CVSS3