Korean
<< Back
VID 23345
Severity 40
Port 631
Protocol TCP
Class CUPS
Detailed Description CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

- cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 trusting any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker controlled URL. (CVE-2024-47176)
- libcupsfilters <= 2.1b1 cfGetPrinterAttributes5 does not validate or sanitize the IPP attributes returned from an IPP server, providing attacker controlled data to the rest of the CUPS system.(CVE-2024-47076)
- libppd <= 2.1b1 ppdCreatePPDFromIPP2 does not validate or sanitize the IPP attributes when writing them to a temporary PPD file, allowing the injection of attacker controlled data in the resulting PPD.(CVE-2024-47175)
- cups-filters <= 2.0.1 foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter. (CVE-2024-47177)

* References:
https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I

* Platforms Affected:
Linux Any version
Unix Any version
Recommendation * Deactivate the cups-browsed service (if not in use)
- Command: `$ sudo systemctl stop cups-browsed; sudo systemctl disable cups-browsed`
* Restart the CUPS service
- Command: `$ sudo systemctl restart cups`
* Strengthen firewall settings
- Block external access to UDP port 631
- Command: `$ sudo ufw deny proto udp from any to any port 631`
Related URL CVE-2024-47176,CVE-2024-47076,CVE-2024-47175,CVE-2024-47177 (CVE)
Related URL 75098 (SecurityFocus)
Related URL (ISS)