First published: Wed Feb 07 2018(Updated: )
Insufficient restriction of IPP filters in CUPS in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker to execute a command with the same privileges as the cups daemon via a crafted PPD file, aka a printer zeroconfig CRLF issue.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cups | 2.2.10-6+deb10u6 2.2.10-6+deb10u9 2.3.3op2-3+deb11u6 2.3.3op2-3+deb11u2 2.4.2-3+deb12u5 2.4.7-1 | |
Chrome OS | <62.0.3202.74 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15400 has been classified as a high severity vulnerability due to its potential for remote command execution.
To fix CVE-2017-15400, upgrade to Google Chrome OS version 62.0.3202.74 or later.
CVE-2017-15400 affects Google Chrome OS versions prior to 62.0.3202.74.
CVE-2017-15400 is an insufficient restriction vulnerability related to IPP filters in CUPS.
Yes, CVE-2017-15400 can be exploited remotely via a crafted PPD file.