Количество 16
Количество 16
BDU:2024-07645
Уязвимость функции ppdCreatePPDFromIPP2 библиотеки libppd сервера печати CUPS, позволяющая нарушителю записывать произвольные данные
CVE-2024-47175
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
CVE-2024-47175
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
CVE-2024-47175
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
CVE-2024-47175
CUPS is a standards-based, open-source printing system, and `libppd` c ...
SUSE-SU-2025:03225-1
Security update for cups-filters
RLSA-2025:0083
Low: cups security update
RLSA-2024:9470
Low: cups security update
ELSA-2025-0083
ELSA-2025-0083: cups security update (LOW)
ELSA-2024-9470
ELSA-2024-9470: cups security update (LOW)
SUSE-SU-2025:03261-1
Security update for cups
RLSA-2024:7463
Important: cups-filters security update
RLSA-2024:7346
Important: cups-filters security update
ELSA-2024-7463
ELSA-2024-7463: cups-filters security update (IMPORTANT)
ELSA-2024-7346
ELSA-2024-7346: cups-filters security update (IMPORTANT)
ELSA-2024-7553
ELSA-2024-7553: cups-filters security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-07645 Уязвимость функции ppdCreatePPDFromIPP2 библиотеки libppd сервера печати CUPS, позволяющая нарушителю записывать произвольные данные | CVSS3: 6.8 | 29% Средний | около 1 года назад | |
CVE-2024-47175 CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. | CVSS3: 8.6 | 29% Средний | около 1 года назад | |
CVE-2024-47175 CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. | CVSS3: 7.7 | 29% Средний | около 1 года назад | |
CVE-2024-47175 CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. | CVSS3: 8.6 | 29% Средний | около 1 года назад | |
CVE-2024-47175 CUPS is a standards-based, open-source printing system, and `libppd` c ... | CVSS3: 8.6 | 29% Средний | около 1 года назад | |
SUSE-SU-2025:03225-1 Security update for cups-filters | 29% Средний | около 2 месяцев назад | ||
RLSA-2025:0083 Low: cups security update | 29% Средний | 10 месяцев назад | ||
RLSA-2024:9470 Low: cups security update | 29% Средний | 8 месяцев назад | ||
ELSA-2025-0083 ELSA-2025-0083: cups security update (LOW) | 10 месяцев назад | |||
ELSA-2024-9470 ELSA-2024-9470: cups security update (LOW) | 12 месяцев назад | |||
SUSE-SU-2025:03261-1 Security update for cups | около 2 месяцев назад | |||
RLSA-2024:7463 Important: cups-filters security update | около 1 года назад | |||
RLSA-2024:7346 Important: cups-filters security update | около 1 года назад | |||
ELSA-2024-7463 ELSA-2024-7463: cups-filters security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-7346 ELSA-2024-7346: cups-filters security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-7553 ELSA-2024-7553: cups-filters security update (IMPORTANT) | 12 месяцев назад |
Уязвимостей на страницу