Bug 2314256 (CVE-2024-47175) - CVE-2024-47175 cups: libppd: remote command injection via attacker controlled data in PPD file
Summary: CVE-2024-47175 cups: libppd: remote command injection via attacker controlled...
Keywords:
Status: NEW
Alias: CVE-2024-47175
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2315001 2315002 2315004
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-09-23 17:10 UTC by OSIDB Bzimport
Modified: 2024-10-03 14:15 UTC (History)
25 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A security issue was found in OpenPrinting CUPS. The function ppdCreatePPDFromIPP2 in the libppd library is responsible for generating a PostScript Printer Description (PPD) file based on attributes retrieved from an Internet Printing Protocol (IPP) response. Essentially, it takes printer information, usually obtained via IPP, and creates a corresponding PPD file that describes the printer's capabilities (such as supported media sizes, resolutions, color modes, etc.). PPD files are used by printing systems like CUPS (Common Unix Printing System) to communicate with and configure printers. They provide a standardized format that allows different printers to work with the printing system in a consistent way. The ppdCreatePPDFromIPP2 function in libppd doesn't properly check or clean IPP attributes before writing them to a temporary PPD file. This means that a remote attacker, who has control of or has hijacked an exposed printer (through UPD or mDNS), could send a harmful IPP attribute and potentially insert malicious commands into the PPD file.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:7369 0 None None None 2024-09-30 09:36:17 UTC
Red Hat Product Errata RHBA-2024:7493 0 None None None 2024-10-02 08:34:07 UTC
Red Hat Product Errata RHSA-2024:7346 0 None None None 2024-09-27 20:12:56 UTC
Red Hat Product Errata RHSA-2024:7461 0 None None None 2024-10-01 18:22:40 UTC
Red Hat Product Errata RHSA-2024:7462 0 None None None 2024-10-01 18:29:26 UTC
Red Hat Product Errata RHSA-2024:7463 0 None None None 2024-10-01 18:30:51 UTC
Red Hat Product Errata RHSA-2024:7503 0 None None None 2024-10-02 11:55:55 UTC
Red Hat Product Errata RHSA-2024:7504 0 None None None 2024-10-02 11:32:13 UTC
Red Hat Product Errata RHSA-2024:7506 0 None None None 2024-10-02 11:31:56 UTC
Red Hat Product Errata RHSA-2024:7551 0 None None None 2024-10-02 18:18:44 UTC
Red Hat Product Errata RHSA-2024:7553 0 None None None 2024-10-02 18:26:49 UTC
Red Hat Product Errata RHSA-2024:7623 0 None None None 2024-10-03 11:23:28 UTC

Description OSIDB Bzimport 2024-09-23 17:10:28 UTC
A remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) and was able to return a malicious IPP attribute, the attacker may be able to exploit FoomaticRIPCommandLine to execute arbitrary commands. Due to a lack of sanitization in `cfGetPrinterAttributes` API and `ppdCreatePPDFromIPP2`, a vulnerable CUPS system will execute the `foomatic-rip` filter binary when a print job is sent to the printer.

Comment 1 errata-xmlrpc 2024-09-27 20:12:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:7346 https://access.redhat.com/errata/RHSA-2024:7346

Comment 2 errata-xmlrpc 2024-10-01 18:22:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:7461 https://access.redhat.com/errata/RHSA-2024:7461

Comment 3 errata-xmlrpc 2024-10-01 18:29:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:7462 https://access.redhat.com/errata/RHSA-2024:7462

Comment 4 errata-xmlrpc 2024-10-01 18:30:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:7463 https://access.redhat.com/errata/RHSA-2024:7463

Comment 5 errata-xmlrpc 2024-10-02 11:31:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:7506 https://access.redhat.com/errata/RHSA-2024:7506

Comment 6 errata-xmlrpc 2024-10-02 11:32:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:7504 https://access.redhat.com/errata/RHSA-2024:7504

Comment 7 errata-xmlrpc 2024-10-02 11:55:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:7503 https://access.redhat.com/errata/RHSA-2024:7503

Comment 8 errata-xmlrpc 2024-10-02 18:18:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7.7 Advanced Update Support

Via RHSA-2024:7551 https://access.redhat.com/errata/RHSA-2024:7551

Comment 9 errata-xmlrpc 2024-10-02 18:26:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2024:7553 https://access.redhat.com/errata/RHSA-2024:7553

Comment 10 errata-xmlrpc 2024-10-03 11:23:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:7623 https://access.redhat.com/errata/RHSA-2024:7623


Note You need to log in before you can comment on or make changes to this bug.