CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
History

Fri, 27 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting
Openprinting libcupsfilters
CPEs cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:*
Vendors & Products Openprinting
Openprinting libcupsfilters
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 23:30:00 +0000


Thu, 26 Sep 2024 22:15:00 +0000


Thu, 26 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
Description CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
Title libcupsfilters's cfGetPrinterAttributes5 does not validate IPP attributes returned from an IPP server
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-26T21:18:22.067Z

Updated: 2024-09-27T18:03:28.585Z

Reserved: 2024-09-17T17:42:37.030Z

Link: CVE-2024-47076

cve-icon Vulnrichment

Updated: 2024-09-27T18:03:19.816Z

cve-icon NVD

Status : Received

Published: 2024-09-26T22:15:04.063

Modified: 2024-09-26T22:15:04.063

Link: CVE-2024-47076

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-26T20:00:00Z

Links: CVE-2024-47076 - Bugzilla