CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Configurations

No configuration.

History

02 Oct 2024, 20:15

Type Values Removed Values Added
CWE CWE-749
CWE-20

02 Oct 2024, 19:15

Type Values Removed Values Added
Summary (en) CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. (en) CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CVSS v2 : unknown
v3 : 8.3
v2 : unknown
v3 : 5.3

30 Sep 2024, 12:46

Type Values Removed Values Added
Summary
  • (es) CUPS es un sistema de impresión de código abierto basado en estándares, y `cups-browsed` contiene funcionalidades de impresión en red que incluyen, entre otras, servicios de impresión de detección automática e impresoras compartidas. `cups-browsed` se vincula a `INADDR_ANY:631`, lo que hace que confíe en cualquier paquete de cualquier origen, y puede provocar la solicitud IPP `Get-Printer-Attributes` a una URL controlada por el atacante. Debido a la vinculación del servicio a `*:631 ( INADDR_ANY )`, se pueden explotar varios errores en `cups-browsed` en secuencia para introducir una impresora maliciosa en el sistema. Esta cadena de exploits finalmente permite a un atacante ejecutar comandos arbitrarios de forma remota en la máquina de destino sin autenticación cuando se inicia un trabajo de impresión. Esto plantea un riesgo de seguridad significativo en la red. Cabe destacar que esta vulnerabilidad es particularmente preocupante ya que se puede explotar desde Internet público, lo que potencialmente expone una gran cantidad de sistemas a ataques remotos si sus servicios CUPS están habilitados.

26 Sep 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-26 22:15

Updated : 2024-10-02 20:15


NVD link : CVE-2024-47176

Mitre link : CVE-2024-47176

CVE.ORG link : CVE-2024-47176


JSON object : View

Products Affected

No product.

CWE
CWE-1327

Binding to an Unrestricted IP Address