Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - Release Notes | |
References | () https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - Exploit, Vendor Advisory | |
References | () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - Exploit, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - Mailing List, Release Notes | |
References | () https://takeonme.org/cves/CVE-2023-4504.html - Exploit |
09 Nov 2023, 20:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
16 Oct 2023, 19:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
First Time |
Fedoraproject
Debian debian Linux Debian Fedoraproject fedora |
|
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ - Mailing List, Release Notes | |
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ - Mailing List, Release Notes | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ - Mailing List, Release Notes | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ - Mailing List, Release Notes | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ - Third Party Advisory |
07 Oct 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Sep 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Sep 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Sep 2023, 15:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Sep 2023, 14:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openprinting cups
Openprinting Openprinting libppd |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h - Exploit, Vendor Advisory | |
References | (MISC) https://takeonme.org/cves/CVE-2023-4504.html - Exploit | |
References | (MISC) https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 - Release Notes | |
CPE | cpe:2.3:a:openprinting:libppd:2.0:rc2:*:*:*:linux:*:* cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:* |
|
CWE | CWE-787 |
23 Sep 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. |
21 Sep 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-21 23:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4504
Mitre link : CVE-2023-4504
CVE.ORG link : CVE-2023-4504
JSON object : View
Products Affected
debian
- debian_linux
openprinting
- cups
- libppd
fedoraproject
- fedora