First published: Wed May 24 2023(Updated: )
A buffer overflow vulnerability in the function |format_log_line| could allow remote attackers to cause a denial-of-service(DoS) on the affected system (not verified for possible arbitrary code execution). Exploitation of the vulnerability can be triggered when the configuration file |cupsd.conf| sets the value of |loglevel |to |DEBUG|.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenPrinting CUPS | <=2.4.2 | |
Debian Debian Linux | =10.0 | |
ubuntu/cups | <2.2.7-1ubuntu2.10 | 2.2.7-1ubuntu2.10 |
ubuntu/cups | <2.3.1-9ubuntu1.3 | 2.3.1-9ubuntu1.3 |
ubuntu/cups | <2.4.1 | 2.4.1 |
ubuntu/cups | <2.4.2-1ubuntu2.1 | 2.4.2-1ubuntu2.1 |
ubuntu/cups | <2.4.2-3ubuntu2.1 | 2.4.2-3ubuntu2.1 |
ubuntu/cups | <2.1.3-4ubuntu0.11+ | 2.1.3-4ubuntu0.11+ |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
debian/cups | <=2.3.3op2-3+deb11u2 | 2.3.3op2-3+deb11u6 2.4.2-3+deb12u5 2.4.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32324 is a heap buffer overflow vulnerability in cupsd, the OpenPrinting CUPS daemon, that could allow a remote attacker to launch a denial of service (DoS) attack.
Versions 2.4.2 and prior of CUPS are affected by CVE-2023-32324.
CVE-2023-32324 has a high severity rating with a CVSS score of 5.5.
For Ubuntu, the specific versions that fix CVE-2023-32324 are: 2.2.7-1ubuntu2.10, 2.3.1-9ubuntu1.3, 2.4.1, 2.4.2-1ubuntu2.1, 2.4.2-3ubuntu2.1, and 2.1.3-4ubuntu0.11+.
For Debian, the specific versions that fix CVE-2023-32324 are: 2.2.10-6+deb10u9, 2.3.3op2-3+deb11u6, 2.4.2-3+deb12u4, and 2.4.7-1.