libcupsfilters: improper input validation in libcupsfilters (CVE-2024-47076) #shorts #breaking

CVE

This security vulnerability involves the improper validation of input in the `libcupsfilters` library, specifically affecting OpenPrinting libcupsfilters versions up to 2.1b1. This library is part of the Common Unix Printing System, an open-source and standards-based printing system. The flaw resides in the `cfGetPrinterAttributes5` function, which fails to properly sanitize Internet Printing Protocol attributes received from an IPP server. This oversight allows an attacker to craft malicious data that could be introduced into the wider CUPS system. As this issue is considered a zero-day vulnerability, it means it was just discovered two days ago, and no prior defenses were available to protect against it. While the specific tools used by attackers and affected parties remain unspecified, anyone using the CUPS printing system should be aware of this potential threat.

Watch the full video on YouTube: CVE-2024-47076

Remediation and exploitation details

This chain involves the following actors

This following systems are involved

Attack entry point

Remediation actions

Exploitation actions

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2024-47076
Description
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
Provider
GitHub_M
CWE / problem types
CWE-20: Improper Input Validation
Affected Software Versions
OpenPrinting:libcupsfilters:[{'version': '<= 2.1b1', 'status': 'affected'}]
Date Published
2024-09-26T21:18:22.067Z
Last Updated
2024-09-28T03:55:45.705Z