CVE-2023-4504

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
References
Link Resource
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 Release Notes
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h Exploit Vendor Advisory
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ Mailing List Release Notes
https://takeonme.org/cves/CVE-2023-4504.html Exploit
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 Release Notes
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h Exploit Vendor Advisory
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ Mailing List Release Notes
https://takeonme.org/cves/CVE-2023-4504.html Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*
cpe:2.3:a:openprinting:libppd:2.0:rc2:*:*:*:linux:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - Release Notes () https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - Release Notes
References () https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - Exploit, Vendor Advisory () https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - Exploit, Vendor Advisory
References () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - Exploit, Vendor Advisory () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - Mailing List, Release Notes
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - Mailing List, Release Notes
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - Mailing List, Release Notes
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - Mailing List, Release Notes () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - Mailing List, Release Notes
References () https://takeonme.org/cves/CVE-2023-4504.html - Exploit () https://takeonme.org/cves/CVE-2023-4504.html - Exploit

09 Nov 2023, 20:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.0

16 Oct 2023, 19:32

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
First Time Fedoraproject
Debian debian Linux
Debian
Fedoraproject fedora
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - Mailing List, Release Notes
References (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - Mailing List, Release Notes
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - Mailing List, Release Notes
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - Mailing List, Release Notes
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - Third Party Advisory

07 Oct 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ -

30 Sep 2023, 20:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html -

29 Sep 2023, 02:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ -

27 Sep 2023, 15:19

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ -

26 Sep 2023, 14:16

Type Values Removed Values Added
First Time Openprinting cups
Openprinting
Openprinting libppd
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References (MISC) https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - (MISC) https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - Exploit, Vendor Advisory
References (MISC) https://takeonme.org/cves/CVE-2023-4504.html - (MISC) https://takeonme.org/cves/CVE-2023-4504.html - Exploit
References (MISC) https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - (MISC) https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - Exploit, Vendor Advisory
References (MISC) https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - (MISC) https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - Release Notes
CPE cpe:2.3:a:openprinting:libppd:2.0:rc2:*:*:*:linux:*:*
cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*
CWE CWE-787

23 Sep 2023, 16:15

Type Values Removed Values Added
Summary Due to failure in validating the length provided by an attacker-crafted PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

21 Sep 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 23:15

Updated : 2024-11-21 08:35


NVD link : CVE-2023-4504

Mitre link : CVE-2023-4504

CVE.ORG link : CVE-2023-4504


JSON object : View

Products Affected

debian

  • debian_linux

openprinting

  • cups
  • libppd

fedoraproject

  • fedora
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write