rhsa-2024_7551
Vulnerability from csaf_redhat
Published
2024-10-02 18:21
Modified
2024-11-24 19:41
Summary
Red Hat Security Advisory: cups-filters security update
Notes
Topic
An update for cups-filters is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently.
Security Fix(es):
* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()
* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)
* cups: libppd: remote command injection via attacker controlled data in PPD file ()
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cups-filters is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The cups-filters package contains back ends, filters, and other software that was once part of the core Common UNIX Printing System (CUPS) distribution but is now maintained independently. \n\nSecurity Fix(es):\n\n* cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source ()\n\n* cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes (CVE-2024-47076)\n\n* cups: libppd: remote command injection via attacker controlled data in PPD file ()\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:7551", "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7551.json" } ], "title": "Red Hat Security Advisory: cups-filters security update", "tracking": { "current_release_date": "2024-11-24T19:41:42+00:00", "generator": { "date": "2024-11-24T19:41:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:7551", "initial_release_date": "2024-10-02T18:21:54+00:00", "revision_history": [ { "date": "2024-10-02T18:21:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-02T18:21:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-24T19:41:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-26.el7_7.3.src", "product": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src", "product_id": "cups-filters-0:1.0.35-26.el7_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-26.el7_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-26.el7_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product_id": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-26.el7_7.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-libs@1.0.35-26.el7_7.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-debuginfo@1.0.35-26.el7_7.3?arch=i686" } } }, { "category": "product_version", "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product_id": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-filters-devel@1.0.35-26.el7_7.3?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.src", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)", "product_id": "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.src", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "relates_to_product_reference": "7Server-optional-7.7.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)", "product_id": "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" }, "product_reference": "cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "relates_to_product_reference": "7Server-optional-7.7.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-23T16:47:10.408000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314253" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenPrinting CUPS. In certain conditions, a remote attacker can add a malicious printer or directly hijack an existing printer by replacing the valid IPP URL with a malicious one. Also, it is possible that due to a lack of validation of IPP attributes returned by the server, this issue allows attacker-controlled data to be used on the rest of the CUPS system.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47076" }, { "category": "external", "summary": "RHBZ#2314253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5/" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes" }, { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2024-09-23T16:57:36.269000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314256" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nThe ppdCreatePPDFromIPP2 function in libppd doesn\u0027t properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: libppd: remote command injection via attacker controlled data in PPD file", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS and RHEL include libs-cups as a build-time dependency. However, the vulnerability is not exploitable with just the client libraries unless a print server based on OpenPrinting is actively running.\n\nRHEL and RHCOS does not have cups-browsed enabled by default so the impact for those are set to \u0027Low\u0027", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47175" }, { "category": "external", "summary": "RHBZ#2314256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47175", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47175" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups: libppd: remote command injection via attacker controlled data in PPD file" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-940", "name": "Improper Verification of Source of a Communication Channel" }, "discovery_date": "2024-09-23T16:37:23.865000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314252" } ], "notes": [ { "category": "description", "text": "A security issue was found in OpenPrinting CUPS.\n\nThe function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer\u0027s capabilities (such as supported media sizes, resolutions, color modes, etc.).\n\nPPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way.\n\nA security issue was discovered in OpenPrinting CUPS. The `cups-browsed` component is responsible for discovering printers on a network and adding them to the system. In order to do so, the service uses two distinct protocols. For the first one, the service binds on all interfaces on UDP port 631 and accepts a custom packet from any untrusted source. This is exploitable from outside the LAN if the computer is exposed on the public internet. The service also listens for DNS-SD / mDNS advertisements trough AVAHI. In both cases, when a printer is discovered by either the UDP packet or mDNS, its IPP or IPPS url is automatically contacted by cups-browsed and a `Get-Printer-Attributes` request is sent to it which can leak potentially sensitive system information to an attacker via the User-Agent header.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source", "title": "Vulnerability summary" }, { "category": "other", "text": "The cups-browsed service is disabled by default on all versions of RHEL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47176" }, { "category": "external", "summary": "RHBZ#2314252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47176" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" } ], "release_date": "2024-09-26T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source" }, { "cve": "CVE-2024-47850", "discovery_date": "2024-10-04T05:00:52.670668+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316417" } ], "notes": [ { "category": "description", "text": "A flaw was found in cups-browsed. This vulnerability allows an attacker to launch DDoS amplification attacks via an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack", "title": "Vulnerability summary" }, { "category": "other", "text": "CVE-2024-47850 is resolved by the same fixes released for the related CVE-2024-47176.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47850" }, { "category": "external", "summary": "RHBZ#2316417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316417" }, { "category": "external", "summary": "RHSB-2024-002", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47850", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47850" }, { "category": "external", "summary": "https://github.com/OpenPrinting/cups", "url": "https://github.com/OpenPrinting/cups" }, { "category": "external", "summary": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat", "url": "https://www.akamai.com/blog/security-research/october-cups-ddos-threat" } ], "release_date": "2024-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-02T18:21:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "workaround", "details": "See the security bulletin for a detailed mitigation procedure.", "product_ids": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.src", "7Server-optional-7.7.AUS:cups-filters-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-debuginfo-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-devel-0:1.0.35-26.el7_7.3.x86_64", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.i686", "7Server-optional-7.7.AUS:cups-filters-libs-0:1.0.35-26.el7_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.