Логотип exploitDog
bind:"CVE-2024-47176" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-47176" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"

Количество 27

Количество 27

rocky логотип

RLSA-2024:7463

8 месяцев назад

Important: cups-filters security update

EPSS: Низкий
rocky логотип

RLSA-2024:7346

9 месяцев назад

Important: cups-filters security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7463

9 месяцев назад

ELSA-2024-7463: cups-filters security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7346

9 месяцев назад

ELSA-2024-7346: cups-filters security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7553

7 месяцев назад

ELSA-2024-7553: cups-filters security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2024-47176

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
EPSS: Критический
redhat логотип

CVE-2024-47176

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2024-47176

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
EPSS: Критический
debian логотип

CVE-2024-47176

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `cups-brow ...

CVSS3: 5.3
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2024:3523-1

9 месяцев назад

Security update for cups-filters

EPSS: Критический
fstec логотип

BDU:2024-07643

9 месяцев назад

Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2024:3711-1

8 месяцев назад

Security update for cups-filters

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3570-1

8 месяцев назад

Security update for cups-filters

EPSS: Низкий
ubuntu логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
redhat логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
EPSS: Высокий
nvd логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
debian логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
EPSS: Высокий
ubuntu логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний
redhat логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
EPSS: Средний
nvd логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:7463

Important: cups-filters security update

8 месяцев назад
rocky логотип
RLSA-2024:7346

Important: cups-filters security update

9 месяцев назад
oracle-oval логотип
ELSA-2024-7463

ELSA-2024-7463: cups-filters security update (IMPORTANT)

9 месяцев назад
oracle-oval логотип
ELSA-2024-7346

ELSA-2024-7346: cups-filters security update (IMPORTANT)

9 месяцев назад
oracle-oval логотип
ELSA-2024-7553

ELSA-2024-7553: cups-filters security update (IMPORTANT)

7 месяцев назад
ubuntu логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
92%
Критический
9 месяцев назад
redhat логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 7.5
92%
Критический
9 месяцев назад
nvd логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
92%
Критический
9 месяцев назад
debian логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-brow ...

CVSS3: 5.3
92%
Критический
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3523-1

Security update for cups-filters

92%
Критический
9 месяцев назад
fstec логотип
BDU:2024-07643

Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9
92%
Критический
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3711-1

Security update for cups-filters

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3570-1

Security update for cups-filters

8 месяцев назад
ubuntu логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
81%
Высокий
9 месяцев назад
redhat логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
81%
Высокий
9 месяцев назад
nvd логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
81%
Высокий
9 месяцев назад
debian логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
81%
Высокий
9 месяцев назад
ubuntu логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
9 месяцев назад
redhat логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
29%
Средний
9 месяцев назад
nvd логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
9 месяцев назад

Уязвимостей на страницу