Логотип exploitDog
bind:"CVE-2024-47176" OR bind:"CVE-2024-47850" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-47176" OR bind:"CVE-2024-47850" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"

Количество 34

Количество 34

fstec логотип

BDU:2024-09520

9 месяцев назад

Уязвимость службы cups-browsed сервера печати CUPS, позволяющая нарушителю вызывать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
redhat логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
EPSS: Высокий
nvd логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
debian логотип

CVE-2024-47076

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
EPSS: Высокий
ubuntu логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний
redhat логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
EPSS: Средний
nvd логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний
debian логотип

CVE-2024-47175

9 месяцев назад

CUPS is a standards-based, open-source printing system, and `libppd` c ...

CVSS3: 8.6
EPSS: Средний
fstec логотип

BDU:2024-07644

9 месяцев назад

Уязвимость функции cfGetPrinterAttributes5 библиотеки libcupsfilters сервера печати CUPS, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.8
EPSS: Высокий
rocky логотип

RLSA-2025:0083

5 месяцев назад

Low: cups security update

EPSS: Средний
oracle-oval логотип

ELSA-2025-0083

5 месяцев назад

ELSA-2025-0083: cups security update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9470

7 месяцев назад

ELSA-2024-9470: cups security update (LOW)

EPSS: Низкий
fstec логотип

BDU:2024-07645

9 месяцев назад

Уязвимость функции ppdCreatePPDFromIPP2 библиотеки libppd сервера печати CUPS, позволяющая нарушителю записывать произвольные данные

CVSS3: 6.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-09520

Уязвимость службы cups-browsed сервера печати CUPS, позволяющая нарушителю вызывать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
9 месяцев назад
ubuntu логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
81%
Высокий
9 месяцев назад
redhat логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
81%
Высокий
9 месяцев назад
nvd логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
81%
Высокий
9 месяцев назад
debian логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
81%
Высокий
9 месяцев назад
ubuntu логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
9 месяцев назад
redhat логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
29%
Средний
9 месяцев назад
nvd логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
9 месяцев назад
debian логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` c ...

CVSS3: 8.6
29%
Средний
9 месяцев назад
fstec логотип
BDU:2024-07644

Уязвимость функции cfGetPrinterAttributes5 библиотеки libcupsfilters сервера печати CUPS, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.8
81%
Высокий
9 месяцев назад
rocky логотип
RLSA-2025:0083

Low: cups security update

29%
Средний
5 месяцев назад
oracle-oval логотип
ELSA-2025-0083

ELSA-2025-0083: cups security update (LOW)

5 месяцев назад
oracle-oval логотип
ELSA-2024-9470

ELSA-2024-9470: cups security update (LOW)

7 месяцев назад
fstec логотип
BDU:2024-07645

Уязвимость функции ppdCreatePPDFromIPP2 библиотеки libppd сервера печати CUPS, позволяющая нарушителю записывать произвольные данные

CVSS3: 6.8
29%
Средний
9 месяцев назад

Уязвимостей на страницу