CVE-2024-47076
Rocky Linux vulnerability analysis and mitigation

Overview

CVE-2024-47076 affects OpenPrinting CUPS, specifically the cfGetPrinterAttributes5 function in libcupsfilters. The vulnerability was discovered and disclosed on September 26, 2024. The function fails to sanitize IPP attributes returned from an IPP server, which when used to generate a PPD file, can lead to attacker-controlled data being provided to the rest of the CUPS system. This vulnerability affects all versions of Red Hat Enterprise Linux (RHEL) and libcupsfilters <= 2.1b1 (GHSA Advisory, NVD).

Technical details

The vulnerability exists in the cfGetPrinterAttributes5 function of libcupsfilters, which processes IPP (Internet Printing Protocol) attributes returned from a printer server. The function does not properly validate or sanitize these attributes before they are used to generate PPD (PostScript Printer Description) files. The vulnerability has been assigned a CVSS v3.1 base score of 8.6 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N, indicating a network-exploitable vulnerability requiring no privileges or user interaction (NVD).

Impact

When exploited, this vulnerability can allow an attacker to inject controlled data into the CUPS system through malicious IPP attributes. This can lead to potential security breaches when these attributes are used to generate PPD files. The vulnerability is particularly concerning as it can be chained with other vulnerabilities (CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) to achieve remote code execution on affected systems (Evil Socket).

Mitigation and workarounds

To mitigate this vulnerability, administrators should: 1) Disable and stop the cups-browsed service using 'systemctl stop cups-browsed' and 'systemctl disable cups-browsed' if printing is not needed, 2) Ensure the system is not vulnerable by checking if cups-browsed is running using 'systemctl status cups-browsed', 3) Block all traffic to UDP port 631 and DNS-SD traffic if the service must remain active. Red Hat and the broader Linux community are working on patches to address these issues (Red Hat Blog).

Community reactions

The vulnerability has garnered significant attention in the security community, particularly due to its potential for remote code execution when chained with other vulnerabilities. Red Hat has rated these issues with a severity impact of Important, noting that while all versions of RHEL are affected, the packages are not vulnerable in their default configuration (Red Hat Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management