Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2024.0327
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2024-0327)
Summary:The remote host is missing an update for the 'cups, cups-filters' package(s) announced via the MGASA-2024-0327 advisory.
Description:Summary:
The remote host is missing an update for the 'cups, cups-filters' package(s) announced via the MGASA-2024-0327 advisory.

Vulnerability Insight:
The `cfGetPrinterAttributes5` function in `libcupsfilters` does not
sanitize IPP attributes returned from an IPP server. When these IPP
attributes are used, for instance, to generate a PPD file, this can lead
to attacker controlled data to be provided to the rest of the CUPS
system. (CVE-2024-47076)
The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP
attributes when creating the PPD buffer. When used in combination with
other functions such as `cfGetPrinterAttributes5`, can result in user
controlled input and ultimately code execution via Foomatic. This
vulnerability can be part of an exploit chain leading to remote code
execution (RCE), as described in CVE-2024-47176. (CVE-2024-47175)
`cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet
from any source, and can cause the `Get-Printer-Attributes` IPP request
to an attacker controlled URL. When combined with other vulnerabilities,
such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker
can execute arbitrary commands remotely on the target machine without
authentication when a malicious printer is printed to. (CVE-2024-47176)
Any value passed to `FoomaticRIPCommandLine` via a PPD file will be
executed as a user controlled command. When combined with other logic
bugs as described in CVE_2024-47176, this can lead to remote command
execution. (CVE-2024-47177)

Affected Software/OS:
'cups, cups-filters' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-47076
Common Vulnerability Exposure (CVE) ID: CVE-2024-47175
Common Vulnerability Exposure (CVE) ID: CVE-2024-47176
Common Vulnerability Exposure (CVE) ID: CVE-2024-47177
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.