git: 02f3b1662d32 - main - security/vuxml: Add cups-browsed RCE

From: Tijl Coosemans <tijl_at_FreeBSD.org>
Date: Fri, 27 Sep 2024 15:46:37 UTC
The branch main has been updated by tijl:

URL: https://cgit.FreeBSD.org/ports/commit/?id=02f3b1662d323910f02932884affb820ccc977ff

commit 02f3b1662d323910f02932884affb820ccc977ff
Author:     Tijl Coosemans <tijl@FreeBSD.org>
AuthorDate: 2024-09-27 14:33:56 +0000
Commit:     Tijl Coosemans <tijl@FreeBSD.org>
CommitDate: 2024-09-27 15:15:19 +0000

    security/vuxml: Add cups-browsed RCE
---
 security/vuxml/vuln/2024.xml | 58 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 58 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 27d3c4a2b080..f74fbd616725 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,61 @@
+  <vuln vid="24375796-7cbc-11ef-a3a9-001cc0382b2f">
+    <topic>cups-filters -- remote code execution</topic>
+    <affects>
+      <package>
+	<name>cups-filters</name>
+	<range><gt>0</gt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>OpenPrinting reports:</p>
+	<blockquote cite="https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8">
+	  <p>Due to the service binding to *:631 ( INADDR_ANY ), multiple bugs
+	    in cups-browsed can be exploited in sequence to introduce a
+	    malicious printer to the system. This chain of exploits ultimately
+	    enables an attacker to execute arbitrary commands remotely on the
+	    target machine without authentication when a print job is started.
+	    Posing a significant security risk over the network. Notably, this
+	    vulnerability is particularly concerning as it can be exploited
+	    from the public internet, potentially exposing a vast number of
+	    systems to remote attacks if their CUPS services are enabled.</p>
+	</blockquote>
+	<p>The vulnerability allows an attacker on the internet to create a
+	  new printer device with arbitrary commands in the PPD file of the
+	  printer. Attacks using mDNS on the local network can also replace an
+	  existing printer. The commands are executed when a user attempts to
+	  print on the malicious device. They run with the privileges of the
+	  user "cups".</p>
+	<p>It is recommended to disable the cups_browsed service until patches
+	  become available. On FreeBSD this is the default. You can check the
+	  status and disable the service with the following commands:</p>
+	<p><code># service cups_browsed status<br />
+	  # service cups_browsed stop<br />
+	  # service cups_browsed disable</code></p>
+	<p>Attacks from the internet can be blocked by removing the "cups"
+	  protocol from the BrowseRemoteProtocols and BrowseProtocols
+	  directives in /usr/local/etc/cups/cups-browsed.conf. Attacks using
+	  mDNS can be blocked by removing the "dnssd" protocol as well. Access
+	  can be limited to specific IP addresses using BrowseAllow,
+	  BrowseDeny, and BrowseOrder directives as documented in
+	  cups-browsed.conf(5). Then restart the service with the following
+	  command:</p>
+	<p><code># service cups_browsed restart</code></p>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47076</cvename>
+      <cvename>CVE-2024-47175</cvename>
+      <cvename>CVE-2024-47176</cvename>
+      <cvename>CVE-2024-47177</cvename>
+      <url>https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8</url>
+    </references>
+    <dates>
+      <discovery>2024-09-26</discovery>
+      <entry>2024-09-27</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="ca5f3bbc-7a62-11ef-9533-f875a43e1796">
     <topic>expat -- multiple vulnerabilities</topic>
     <affects>