git: 02f3b1662d32 - main - security/vuxml: Add cups-browsed RCE
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 27 Sep 2024 15:46:37 UTC
The branch main has been updated by tijl: URL: https://cgit.FreeBSD.org/ports/commit/?id=02f3b1662d323910f02932884affb820ccc977ff commit 02f3b1662d323910f02932884affb820ccc977ff Author: Tijl Coosemans <tijl@FreeBSD.org> AuthorDate: 2024-09-27 14:33:56 +0000 Commit: Tijl Coosemans <tijl@FreeBSD.org> CommitDate: 2024-09-27 15:15:19 +0000 security/vuxml: Add cups-browsed RCE --- security/vuxml/vuln/2024.xml | 58 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 27d3c4a2b080..f74fbd616725 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,61 @@ + <vuln vid="24375796-7cbc-11ef-a3a9-001cc0382b2f"> + <topic>cups-filters -- remote code execution</topic> + <affects> + <package> + <name>cups-filters</name> + <range><gt>0</gt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>OpenPrinting reports:</p> + <blockquote cite="https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"> + <p>Due to the service binding to *:631 ( INADDR_ANY ), multiple bugs + in cups-browsed can be exploited in sequence to introduce a + malicious printer to the system. This chain of exploits ultimately + enables an attacker to execute arbitrary commands remotely on the + target machine without authentication when a print job is started. + Posing a significant security risk over the network. Notably, this + vulnerability is particularly concerning as it can be exploited + from the public internet, potentially exposing a vast number of + systems to remote attacks if their CUPS services are enabled.</p> + </blockquote> + <p>The vulnerability allows an attacker on the internet to create a + new printer device with arbitrary commands in the PPD file of the + printer. Attacks using mDNS on the local network can also replace an + existing printer. The commands are executed when a user attempts to + print on the malicious device. They run with the privileges of the + user "cups".</p> + <p>It is recommended to disable the cups_browsed service until patches + become available. On FreeBSD this is the default. You can check the + status and disable the service with the following commands:</p> + <p><code># service cups_browsed status<br /> + # service cups_browsed stop<br /> + # service cups_browsed disable</code></p> + <p>Attacks from the internet can be blocked by removing the "cups" + protocol from the BrowseRemoteProtocols and BrowseProtocols + directives in /usr/local/etc/cups/cups-browsed.conf. Attacks using + mDNS can be blocked by removing the "dnssd" protocol as well. Access + can be limited to specific IP addresses using BrowseAllow, + BrowseDeny, and BrowseOrder directives as documented in + cups-browsed.conf(5). Then restart the service with the following + command:</p> + <p><code># service cups_browsed restart</code></p> + </body> + </description> + <references> + <cvename>CVE-2024-47076</cvename> + <cvename>CVE-2024-47175</cvename> + <cvename>CVE-2024-47176</cvename> + <cvename>CVE-2024-47177</cvename> + <url>https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8</url> + </references> + <dates> + <discovery>2024-09-26</discovery> + <entry>2024-09-27</entry> + </dates> + </vuln> + <vuln vid="ca5f3bbc-7a62-11ef-9533-f875a43e1796"> <topic>expat -- multiple vulnerabilities</topic> <affects>