CVE-2024-47175

Name
CVE-2024-47175
Description
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
MISC https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
MISC https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
MISC https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
MISC https://www.cups.org
MISC https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I

Match rules

CPE URI Source package Min version Max version
libppd >= 0 <= 2.1b1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
cups 3.20-main 2.4.9-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
cups 3.19-main 2.4.9-r1 Natanael Copa <ncopa@alpinelinux.org> fixed