this post was submitted on 26 Sep 2024
115 points (96.0% liked)

Linux

48634 readers
1609 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

There's been talk of this unauthenticated RCE vulnerability coming with a CVSS 9.9 rating but none of the technical details were publicly known until it was made public just now at the top of the hour. Simone Margaritelli discovered this vulnerability and has shared a write-up around this potentially very impactful Linux vulnerability.

This vulnerability, fortunately, doesn't affect the Linux kernel but rather CUPS... The print server commonly used on Linux systems and other platforms.

...

From Attacking UNIX Systems via CUPS, Part I:

"A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started (from that computer)."

...

This remote code execution issue can be exploited across the public Internet via a UDP packet to port 631 without needing any authentication, assuming the CUPS port is open through your router/firewall. LAN attacks are also possible via spoofing zeroconf / mDNS / DNS-SD advertisements.

Besides CUPS being used on Linux distributions, it also affects some BSDs, Oracle Solaris, Google Chrome OS, and others.

As of writing there is no Linux fix available for this high profile security issue. In the meantime it's recommended to disable and remove the "cups-browsed" service, updating CUPS, or at least blocking all traffic to UDP port 631.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 15 points 2 months ago* (last edited 2 months ago) (1 children)

So if Cups is properly sandboxes this is less of an issue? Still not good but not show stopping

I don't think this is 9.9 worthly

Update:

You can use this to get a shell as the lp service user

[–] [email protected] 11 points 2 months ago (1 children)
[–] [email protected] 1 points 2 months ago (1 children)
[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

Not according to RedHat, who I trust a hell of a lot more than a Phoronix article that cites a blog post.

CVE-2024-47176 cups-browsed (7.5)

CVE-2024-47076 cups-filter libcupsfilters (8.2)

CVE-2024-47175 libppd cups cups-filter (7.7)

CVE-2024-47177 cups-filters foomatic (6.1)