Lucene search

K
cveGitHub_MCVE-2024-47175
HistorySep 26, 2024 - 10:15 p.m.

CVE-2024-47175

2024-09-2622:15:04
CWE-20
GitHub_M
web.nvd.nist.gov
14
22
cups
libppd
user controlled input
code execution
foomatic
exploit chain
remote code execution

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS

0

Percentile

14.9%

CUPS is a standards-based, open-source printing system, and libppd can be used for legacy PPD file support. The libppd function ppdCreatePPDFromIPP2 does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as cfGetPrinterAttributes5, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.

Affected configurations

Vulners
Vulnrichment
Node
openprintinglibppdRange2.1b1rc2linux
VendorProductVersionCPE
openprintinglibppd*cpe:2.3:a:openprinting:libppd:*:rc2:*:*:*:linux:*:*

CNA Affected

[
  {
    "vendor": "OpenPrinting",
    "product": "libppd",
    "versions": [
      {
        "version": "<= 2.1b1",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS

0

Percentile

14.9%