Логотип exploitDog
bind:"CVE-2024-47176" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-47176" OR bind:"CVE-2024-47175" OR bind:"CVE-2024-47076"

Количество 30

Количество 30

rocky логотип

RLSA-2024:7463

около 1 года назад

Important: cups-filters security update

EPSS: Низкий
rocky логотип

RLSA-2024:7346

около 1 года назад

Important: cups-filters security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7463

около 1 года назад

ELSA-2024-7463: cups-filters security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7346

около 1 года назад

ELSA-2024-7346: cups-filters security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-7553

12 месяцев назад

ELSA-2024-7553: cups-filters security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2024-47176

около 1 года назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
EPSS: Высокий
redhat логотип

CVE-2024-47176

около 1 года назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 7.5
EPSS: Высокий
nvd логотип

CVE-2024-47176

около 1 года назад

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
EPSS: Высокий
debian логотип

CVE-2024-47176

около 1 года назад

CUPS is a standards-based, open-source printing system, and `cups-brow ...

CVSS3: 5.3
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2024:3523-1

около 1 года назад

Security update for cups-filters

EPSS: Высокий
fstec логотип

BDU:2024-07643

около 1 года назад

Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2024:3711-1

около 1 года назад

Security update for cups-filters

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3570-1

около 1 года назад

Security update for cups-filters

EPSS: Низкий
ubuntu логотип

CVE-2024-47076

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
redhat логотип

CVE-2024-47076

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
EPSS: Высокий
nvd логотип

CVE-2024-47076

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
EPSS: Высокий
debian логотип

CVE-2024-47076

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
EPSS: Высокий
ubuntu логотип

CVE-2024-47175

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний
redhat логотип

CVE-2024-47175

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
EPSS: Средний
nvd логотип

CVE-2024-47175

около 1 года назад

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:7463

Important: cups-filters security update

около 1 года назад
rocky логотип
RLSA-2024:7346

Important: cups-filters security update

около 1 года назад
oracle-oval логотип
ELSA-2024-7463

ELSA-2024-7463: cups-filters security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-7346

ELSA-2024-7346: cups-filters security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-7553

ELSA-2024-7553: cups-filters security update (IMPORTANT)

12 месяцев назад
ubuntu логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
87%
Высокий
около 1 года назад
redhat логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 7.5
87%
Высокий
около 1 года назад
nvd логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

CVSS3: 5.3
87%
Высокий
около 1 года назад
debian логотип
CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-brow ...

CVSS3: 5.3
87%
Высокий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3523-1

Security update for cups-filters

87%
Высокий
около 1 года назад
fstec логотип
BDU:2024-07643

Уязвимость демона cups-browsed сервера печати CUPS, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию

CVSS3: 9
87%
Высокий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3711-1

Security update for cups-filters

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3570-1

Security update for cups-filters

около 1 года назад
ubuntu логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
74%
Высокий
около 1 года назад
redhat логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.2
74%
Высокий
около 1 года назад
nvd логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.

CVSS3: 8.6
74%
Высокий
около 1 года назад
debian логотип
CVE-2024-47076

CUPS is a standards-based, open-source printing system, and `libcupsfi ...

CVSS3: 8.6
74%
Высокий
около 1 года назад
ubuntu логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
около 1 года назад
redhat логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 7.7
29%
Средний
около 1 года назад
nvd логотип
CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

CVSS3: 8.6
29%
Средний
около 1 года назад

Уязвимостей на страницу