CVE-2023-24805

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:cups-filters:2.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
References () https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65 - Patch () https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65 - Patch
References () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x - Exploit, Vendor Advisory () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/ - Mailing List, Release Notes
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/ - Mailing List, Release Notes
References () https://security.gentoo.org/glsa/202401-06 - () https://security.gentoo.org/glsa/202401-06 -
References () https://www.debian.org/security/2023/dsa-5407 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5407 - Third Party Advisory

05 Jan 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-06 -

Information

Published : 2023-05-17 18:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24805

Mitre link : CVE-2023-24805

CVE.ORG link : CVE-2023-24805


JSON object : View

Products Affected

fedoraproject

  • fedora

debian

  • debian_linux

linuxfoundation

  • cups-filters
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')