Количество 13
Количество 13

CVE-2023-24805
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.

CVE-2023-24805
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.

CVE-2023-24805
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
CVE-2023-24805
cups-filters contains backends, filters, and other software required t ...

SUSE-SU-2023:2233-2
Security update for cups-filters

SUSE-SU-2023:2233-1
Security update for cups-filters

RLSA-2023:3425
Important: cups-filters security update

RLSA-2023:3423
Important: cups-filters security update
ELSA-2023-3425
ELSA-2023-3425: cups-filters security update (IMPORTANT)
ELSA-2023-3423
ELSA-2023-3423: cups-filters security update (IMPORTANT)

BDU:2023-02781
Уязвимость компонента beh (Backend Error Handler) пакета для печати cups-filters, позволяющая нарушителю выполнить произвольные команды на сервере печати

SUSE-SU-2023:2287-1
Security update for cups-filters, poppler, texlive

ROS-20230619-07
Уязвимость cups-filters
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-24805 cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime. | CVSS3: 8.8 | 9% Низкий | около 2 лет назад |
![]() | CVE-2023-24805 cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime. | CVSS3: 8.8 | 9% Низкий | около 2 лет назад |
![]() | CVE-2023-24805 cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime. | CVSS3: 8.8 | 9% Низкий | около 2 лет назад |
CVE-2023-24805 cups-filters contains backends, filters, and other software required t ... | CVSS3: 8.8 | 9% Низкий | около 2 лет назад | |
![]() | SUSE-SU-2023:2233-2 Security update for cups-filters | 9% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:2233-1 Security update for cups-filters | 9% Низкий | около 2 лет назад | |
![]() | RLSA-2023:3425 Important: cups-filters security update | 9% Низкий | почти 2 года назад | |
![]() | RLSA-2023:3423 Important: cups-filters security update | 9% Низкий | почти 2 года назад | |
ELSA-2023-3425 ELSA-2023-3425: cups-filters security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-3423 ELSA-2023-3423: cups-filters security update (IMPORTANT) | около 2 лет назад | |||
![]() | BDU:2023-02781 Уязвимость компонента beh (Backend Error Handler) пакета для печати cups-filters, позволяющая нарушителю выполнить произвольные команды на сервере печати | CVSS3: 8.8 | 9% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:2287-1 Security update for cups-filters, poppler, texlive | около 2 лет назад | ||
![]() | ROS-20230619-07 Уязвимость cups-filters | CVSS3: 8.8 | 9% Низкий | около 2 лет назад |
Уязвимостей на страницу