Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-47177 (GCVE-0-2024-47177)
Vulnerability from cvelistv5
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID.
Replaced by CVE-2024-47076
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2025-05-12T21:08:50.663Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "rejectedReasons": [ { "lang": "en", "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \\\"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID." } ], "replacedBy": [ "CVE-2024-47076" ] } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47177", "datePublished": "2024-09-26T21:56:36.661Z", "dateRejected": "2025-05-12T21:07:57.114Z", "dateReserved": "2024-09-19T22:32:11.962Z", "dateUpdated": "2025-05-12T21:08:50.663Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-47177\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-09-26T22:15:04.740\",\"lastModified\":\"2025-05-12T21:15:46.387\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \\\\\\\"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID.\"}],\"metrics\":{},\"references\":[]}}", "vulnrichment": { "containers": "{\"cna\": {\"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \\\\\\\"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID.\"}], \"replacedBy\": [\"CVE-2024-47076\"], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-05-12T21:08:50.663Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-47177\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"REJECTED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-09-19T22:32:11.962Z\", \"datePublished\": \"2024-09-26T21:56:36.661Z\", \"dateUpdated\": \"2025-05-12T21:08:50.663Z\", \"dateRejected\": \"2025-05-12T21:07:57.114Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2024-47177
Vulnerability from fkie_nvd
▼ | URL | Tags |
---|
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \\\"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID." } ], "id": "CVE-2024-47177", "lastModified": "2025-05-12T21:15:46.387", "metrics": {}, "published": "2024-09-26T22:15:04.740", "references": [], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Rejected" }
wid-sec-w-2024-2240
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "CUPS (Common Unix Printing System) ist ein Printspooler, der es lokalen und entfernten Benutzern erm\u00f6glicht, Druckfunktionen \u00fcber das Internet Printing Protocol (IPP) zu nutzen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in CUPS ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2240 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2240.json" }, { "category": "self", "summary": "WID-SEC-2024-2240 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2240" }, { "category": "external", "summary": "Evil Socket - Attacking UNIX Systems via CUPS vom 2024-09-26", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" }, { "category": "external", "summary": "GitHub Gist - CUPS disclosure vom 2024-09-26", "url": "https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1" }, { "category": "external", "summary": "Red Hat Security Bulletin RHSB-2024-002 vom 2024-09-26", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-rj88-6mr5-rcw8 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-w63j-6g73-wmg5 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-7xfx-47qg-grp6 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-p9rh-jxmq-gq47 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "category": "external", "summary": "PoC", "url": "https://github.com/RickdeJager/cupshax" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-01127974EC vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-01127974ec" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7045-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7045-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7044-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7044-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7043-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7042-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7041-1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CF6AB63871 vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cf6ab63871" }, { "category": "external", "summary": "Debian Security Advisory DLA-3905 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00048.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3904 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00047.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7346 vom 2024-09-27", "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "external", "summary": "Debian Security Advisory DSA-5779 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00192.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5778 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00191.html" }, { "category": "external", "summary": "IBM Security Bulletin 7171730 vom 2024-09-30", "url": "https://www.ibm.com/support/pages/node/7171730" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7346 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7346" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7346 vom 2024-09-30", "url": "https://linux.oracle.com/errata/ELSA-2024-7346.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7041-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7461 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7462 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7463 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7043-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7553 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7504 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7503 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7506 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7623 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7463 vom 2024-10-02", "url": "http://linux.oracle.com/errata/ELSA-2024-7463.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7551 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3523-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/53P3ZI4CMCGA6USMZJILJTM3YJC3QERY/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7041-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7043-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7042-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7043-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3570-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3711-1 vom 2024-10-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-3 vom 2024-10-21", "url": "https://ubuntu.com/security/notices/USN-7042-3" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7463 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:7463" }, { "category": "external", "summary": "IGEL Security Notice ISN-2024-19 vom 2024-10-31", "url": "https://kb.igel.com/security-safety/current/isn-2024-19-cups-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2656 vom 2024-11-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2656.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3863-1 vom 2024-11-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JUIJY4Q67AEFHXIYBPNGXZAXSLJ6JFKF/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9470 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9470" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7553 vom 2024-11-14", "url": "https://linux.oracle.com/errata/ELSA-2024-7553.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9470 vom 2024-11-21", "url": "https://linux.oracle.com/errata/ELSA-2024-9470.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0083 vom 2025-01-08", "url": "https://access.redhat.com/errata/RHSA-2025:0083" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-0083 vom 2025-01-11", "url": "http://linux.oracle.com/errata/ELSA-2025-0083.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:0083 vom 2025-01-11", "url": "https://errata.build.resf.org/RLSA-2025:0083" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "CUPS: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchrung von beliebigem Programmcode", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:20:30.925+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-2240", "initial_release_date": "2024-09-26T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-26T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Red Hat aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IGEL und Amazon aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Certified Container", "product": { "name": "IBM App Connect Enterprise Certified Container", "product_id": "T037907", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container" } } } ], "category": "product_name", "name": "App Connect Enterprise" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11", "product": { "name": "IGEL OS 11", "product_id": "T030282", "product_identification_helper": { "cpe": "cpe:/o:igel:os:11" } } }, { "category": "product_version", "name": "12", "product": { "name": "IGEL OS 12", "product_id": "T030283", "product_identification_helper": { "cpe": "cpe:/o:igel:os:12" } } } ], "category": "product_name", "name": "OS" } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896" } }, { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896-fixed" } } ], "category": "product_name", "name": "CUPS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47076" }, { "cve": "CVE-2024-47175", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47177" } ] }
WID-SEC-W-2024-2240
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "CUPS (Common Unix Printing System) ist ein Printspooler, der es lokalen und entfernten Benutzern erm\u00f6glicht, Druckfunktionen \u00fcber das Internet Printing Protocol (IPP) zu nutzen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in CUPS ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren und um Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2240 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2240.json" }, { "category": "self", "summary": "WID-SEC-2024-2240 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2240" }, { "category": "external", "summary": "Evil Socket - Attacking UNIX Systems via CUPS vom 2024-09-26", "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/" }, { "category": "external", "summary": "GitHub Gist - CUPS disclosure vom 2024-09-26", "url": "https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1" }, { "category": "external", "summary": "Red Hat Security Bulletin RHSB-2024-002 vom 2024-09-26", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2024-002" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-rj88-6mr5-rcw8 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-w63j-6g73-wmg5 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-7xfx-47qg-grp6 vom 2024-09-26", "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-p9rh-jxmq-gq47 vom 2024-09-26", "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "category": "external", "summary": "PoC", "url": "https://github.com/RickdeJager/cupshax" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-01127974EC vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-01127974ec" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7045-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7045-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7044-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7044-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7043-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7042-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-1 vom 2024-09-26", "url": "https://ubuntu.com/security/notices/USN-7041-1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-CF6AB63871 vom 2024-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cf6ab63871" }, { "category": "external", "summary": "Debian Security Advisory DLA-3905 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00048.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3904 vom 2024-09-29", "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00047.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7346 vom 2024-09-27", "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "category": "external", "summary": "Debian Security Advisory DSA-5779 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00192.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5778 vom 2024-09-29", "url": "https://lists.debian.org/debian-security-announce/2024/msg00191.html" }, { "category": "external", "summary": "IBM Security Bulletin 7171730 vom 2024-09-30", "url": "https://www.ibm.com/support/pages/node/7171730" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7346 vom 2024-09-30", "url": "https://errata.build.resf.org/RLSA-2024:7346" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7346 vom 2024-09-30", "url": "https://linux.oracle.com/errata/ELSA-2024-7346.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7041-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7461 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7462 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7463 vom 2024-10-01", "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-2 vom 2024-10-01", "url": "https://ubuntu.com/security/notices/USN-7043-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7553 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7504 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7503 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7506 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7623 vom 2024-10-03", "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7463 vom 2024-10-02", "url": "http://linux.oracle.com/errata/ELSA-2024-7463.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:7551 vom 2024-10-02", "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3523-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/53P3ZI4CMCGA6USMZJILJTM3YJC3QERY/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7041-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7041-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-3 vom 2024-10-07", "url": "https://ubuntu.com/security/notices/USN-7043-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7042-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7043-4 vom 2024-10-09", "url": "https://ubuntu.com/security/notices/USN-7043-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3570-1 vom 2024-10-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3711-1 vom 2024-10-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7042-3 vom 2024-10-21", "url": "https://ubuntu.com/security/notices/USN-7042-3" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:7463 vom 2024-10-25", "url": "https://errata.build.resf.org/RLSA-2024:7463" }, { "category": "external", "summary": "IGEL Security Notice ISN-2024-19 vom 2024-10-31", "url": "https://kb.igel.com/security-safety/current/isn-2024-19-cups-vulnerabilities" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2656 vom 2024-11-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2656.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3863-1 vom 2024-11-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JUIJY4Q67AEFHXIYBPNGXZAXSLJ6JFKF/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9470 vom 2024-11-12", "url": "https://access.redhat.com/errata/RHSA-2024:9470" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-7553 vom 2024-11-14", "url": "https://linux.oracle.com/errata/ELSA-2024-7553.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-9470 vom 2024-11-21", "url": "https://linux.oracle.com/errata/ELSA-2024-9470.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0083 vom 2025-01-08", "url": "https://access.redhat.com/errata/RHSA-2025:0083" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-0083 vom 2025-01-11", "url": "http://linux.oracle.com/errata/ELSA-2025-0083.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:0083 vom 2025-01-11", "url": "https://errata.build.resf.org/RLSA-2025:0083" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "CUPS: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchrung von beliebigem Programmcode", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:20:30.925+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-2240", "initial_release_date": "2024-09-26T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-26T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Red Hat aufgenommen" }, { "date": "2024-09-30T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM, Rocky Enterprise Software Foundation und Oracle Linux aufgenommen" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu und Red Hat aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu und SUSE aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-27T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IGEL und Amazon aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Certified Container", "product": { "name": "IBM App Connect Enterprise Certified Container", "product_id": "T037907", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container" } } } ], "category": "product_name", "name": "App Connect Enterprise" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11", "product": { "name": "IGEL OS 11", "product_id": "T030282", "product_identification_helper": { "cpe": "cpe:/o:igel:os:11" } } }, { "category": "product_version", "name": "12", "product": { "name": "IGEL OS 12", "product_id": "T030283", "product_identification_helper": { "cpe": "cpe:/o:igel:os:12" } } } ], "category": "product_name", "name": "OS" } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896" } }, { "category": "product_version_range", "name": "\u003c=2.0.1", "product": { "name": "Open Source CUPS \u003c=2.0.1", "product_id": "825896-fixed" } } ], "category": "product_name", "name": "CUPS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47076", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47076" }, { "cve": "CVE-2024-47175", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "product_status": { "known_affected": [ "67646", "T030282", "T004914", "T030283", "T032255", "74185", "T045853", "T045852", "T045854", "2951", "T002207", "T000126", "398363", "T037907" ], "last_affected": [ "825896" ] }, "release_date": "2024-09-26T22:00:00.000+00:00", "title": "CVE-2024-47177" } ] }
NCSC-2024-0384
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Onlangs zijn er door een onderzoeker een aantal kwetsbaarheden ontdekt in CUPS die kunnen leiden tot Remote Code Execution. Deze zijn bekend gemaakt als \"9.9 RCE affecting all GNU/Unix systems\".", "title": "Feiten" }, { "category": "description", "text": "Door een aaneenschakeling van de vier kwetsbaarheden, kan een kwaadwillende onder bepaalde omstandigheden willekeurige code uitvoeren binnen de context van de CUPS-service.", "title": "Interpretaties" }, { "category": "description", "text": "Er zijn op dit moment nog geen patches beschikbaar om de kwetsbaarheden te verhelpen in CUPS versies lager dan 2.0.1.\n\nTot het moment dat de updates beschikbaar komen is het handelingsperspectief om de cups-browse daemon uit te schakelen.\n\nTevens is het raadzaam om te controleren of CUPS onbereikbaar is vanaf publieke netwerken. Controleer of verkeer van en naar UDP poort 631 wordt geblokkeerd. Hiermee wordt het risico van misbruik vanaf publieke netwerken verminderd.\n\n**UPDATE**\nEr zijn patches beschikbaar gesteld om de kwetsbaarheden te verhelpen. Deze zijn doorgevoerd in de distributies van GNU/Linux systemen.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "general", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47177" } ], "title": "Kwetsbaarheden ontdekt in CUPS", "tracking": { "current_release_date": "2024-10-02T08:45:09.718543Z", "id": "NCSC-2024-0384", "initial_release_date": "2024-09-27T08:45:53.798141Z", "revision_history": [ { "date": "2024-09-27T08:45:53.798141Z", "number": "0", "summary": "Initiele versie" }, { "date": "2024-10-02T08:45:09.718543Z", "number": "1", "summary": "New revision" } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656667", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656629", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:__2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656665", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1657010", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656651", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:___2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656666", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:2.1b1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656627", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:___2.1b1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "openprinting" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-47175", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47175.json" } ], "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "other", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "other", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" } ], "product_status": { "known_affected": [ "CSAFPID-1656629" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656629" ] } ], "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1656651" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656651" ] } ], "title": "CVE-2024-47177" }, { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1656627" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47076.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1656627" ] } ], "title": "CVE-2024-47076" } ] }
ncsc-2024-0384
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Onlangs zijn er door een onderzoeker een aantal kwetsbaarheden ontdekt in CUPS die kunnen leiden tot Remote Code Execution. Deze zijn bekend gemaakt als \"9.9 RCE affecting all GNU/Unix systems\".", "title": "Feiten" }, { "category": "description", "text": "Door een aaneenschakeling van de vier kwetsbaarheden, kan een kwaadwillende onder bepaalde omstandigheden willekeurige code uitvoeren binnen de context van de CUPS-service.", "title": "Interpretaties" }, { "category": "description", "text": "Er zijn op dit moment nog geen patches beschikbaar om de kwetsbaarheden te verhelpen in CUPS versies lager dan 2.0.1.\n\nTot het moment dat de updates beschikbaar komen is het handelingsperspectief om de cups-browse daemon uit te schakelen.\n\nTevens is het raadzaam om te controleren of CUPS onbereikbaar is vanaf publieke netwerken. Controleer of verkeer van en naar UDP poort 631 wordt geblokkeerd. Hiermee wordt het risico van misbruik vanaf publieke netwerken verminderd.\n\n**UPDATE**\nEr zijn patches beschikbaar gesteld om de kwetsbaarheden te verhelpen. Deze zijn doorgevoerd in de distributies van GNU/Linux systemen.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "general", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" }, { "category": "general", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47076" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47175" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47176" }, { "category": "external", "summary": "Reference - redhat", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47177" } ], "title": "Kwetsbaarheden ontdekt in CUPS", "tracking": { "current_release_date": "2024-10-02T08:45:09.718543Z", "id": "NCSC-2024-0384", "initial_release_date": "2024-09-27T08:45:53.798141Z", "revision_history": [ { "date": "2024-09-27T08:45:53.798141Z", "number": "0", "summary": "Initiele versie" }, { "date": "2024-10-02T08:45:09.718543Z", "number": "1", "summary": "New revision" } ], "status": "final", "version": "1.0.1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656667", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-browsed", "product": { "name": "cups-browsed", "product_id": "CSAFPID-1656629", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-browsed:__2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656665", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1657010", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "cups-filters", "product": { "name": "cups-filters", "product_id": "CSAFPID-1656651", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:cups-filters:___2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656666", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:2.1b1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "libcupsfilters", "product": { "name": "libcupsfilters", "product_id": "CSAFPID-1656627", "product_identification_helper": { "cpe": "cpe:2.3:a:openprinting:libcupsfilters:___2.1b1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "openprinting" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47175", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-47175", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47175.json" } ], "title": "CVE-2024-47175" }, { "cve": "CVE-2024-47176", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Exposed Dangerous Method or Function", "title": "CWE-749" }, { "category": "other", "text": "Binding to an Unrestricted IP Address", "title": "CWE-1327" }, { "category": "other", "text": "Improper Verification of Source of a Communication Channel", "title": "CWE-940" } ], "product_status": { "known_affected": [ "CSAFPID-1656629" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656629" ] } ], "title": "CVE-2024-47176" }, { "cve": "CVE-2024-47177", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1656651" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1656651" ] } ], "title": "CVE-2024-47177" }, { "cve": "CVE-2024-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1656627" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47076.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1656627" ] } ], "title": "CVE-2024-47076" } ] }
cnvd-2024-39403
Vulnerability from cnvd
Title: CUPS cups-filters命令注入漏洞
Description:
CUPS是一个基于标准的开源打印系统。
CUPS cups-filters存在命令注入漏洞,攻击者可利用该漏洞在系统上注入和执行任意命令。
Severity: 高
Patch Name: CUPS cups-filters命令注入漏洞的补丁
Patch Description:
CUPS是一个基于标准的开源打印系统。
CUPS cups-filters存在命令注入漏洞,攻击者可利用该漏洞在系统上注入和执行任意命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.cups.org/
Reference: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
Name | CUPS cups-filters <=2.0.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2024-47177" } }, "description": "CUPS\u662f\u4e00\u4e2a\u57fa\u4e8e\u6807\u51c6\u7684\u5f00\u6e90\u6253\u5370\u7cfb\u7edf\u3002\n\nCUPS cups-filters\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6ce8\u5165\u548c\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.cups.org/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2024-39403", "openTime": "2024-09-27", "patchDescription": "CUPS\u662f\u4e00\u4e2a\u57fa\u4e8e\u6807\u51c6\u7684\u5f00\u6e90\u6253\u5370\u7cfb\u7edf\u3002\r\n\r\nCUPS cups-filters\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6ce8\u5165\u548c\u6267\u884c\u4efb\u610f\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "CUPS cups-filters\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "CUPS cups-filters \u003c=2.0.1" }, "referenceLink": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/", "serverity": "\u9ad8", "submitTime": "2024-09-27", "title": "CUPS cups-filters\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.