U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-47076

Change History

New CVE Received by NIST 9/26/2024 6:15:04 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
GitHub, Inc. AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Added CWE

								
							
							
						
GitHub, Inc. CWE-20
Added Description

								
							
							
						
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://www.cups.org [No types assigned]
Added Reference

								
							
							
						
GitHub, Inc. https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I [No types assigned]