First published: Wed Sep 20 2023(Updated: )
Accounts. A permissions issue was addressed with additional restrictions.
Credit: Michael DePlante @izobashi Trend Micro Zero Day InitiativePwn2car Trend Micro Zero Day InitiativeMickey Jin @patch1t Kirin @Pwnrin Claudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosHalle Winkler Politepix @hallewinkler Holger Fuhrmannek Anton Boegler Snoolie Keffaber @0xilis an anonymous researcher Yiğit Can YILMAZ @yilmazcanyigit Rodolphe Brunetti @eisw0lf CVE-2023-4504 Csaba Fitzl @theevilbit Kandji @08Tc3wBB JamfDenis Tokarev @illusionofcha0s Junsung Lee dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroRodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon CVE-2023-5841 Meng Zhang (鲸落) NorthSeaajajfxhj Brian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Wojciech Regula SecuRingRifa'i Rejal Maynando Narendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Zhongquan Li @Guluisacat Yiğit Can YILMAZ @yilmazcanyigit SecuRingKirin @Pwnrin NorthSea냥냥 Vivek Dhar Pedro José Pereira Vieito @pvieito luckyu @uuulucky NorthSeaOm Kothawade the UNTHSC College of PharmacyOmar A. Alanis the UNTHSC College of PharmacyK宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Arsenii Kostromin (0x3c3e) Jonathan Bar Or @yo_yo_yo_jbo MicrosoftBohdan Stasiuk @Bohdan_Stasiuk CVE-2024-41957 Ron Masas Hafiizh HakTrakYoKo Kho @yokoacc HakTrakCharly Suchanek CVE-2024-44134 Domien Schepers Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h CVE-2024-44129 Pedro Tôrres @t0rr3sp3dr0 CVE-2024-44130 cve@takeonme.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cups | <=2.2.10-6+deb10u6<=2.3.3op2-3+deb11u2 | 2.2.10-6+deb10u9 2.3.3op2-3+deb11u6 2.4.2-3+deb12u4 2.4.7-1 |
debian/libppd | 2:0.10-7.3 2:0.10-9 | |
ubuntu/cups | <2.3.1-9ubuntu1.6 | 2.3.1-9ubuntu1.6 |
ubuntu/cups | <2.4.1 | 2.4.1 |
ubuntu/cups | <2.4.2-3ubuntu2.5 | 2.4.2-3ubuntu2.5 |
ubuntu/cups | <2.2.7-1ubuntu2.10+ | 2.2.7-1ubuntu2.10+ |
ubuntu/cups | <2.1.3-4ubuntu0.11+ | 2.1.3-4ubuntu0.11+ |
ubuntu/cups | <2.4.6-0ubuntu2 | 2.4.6-0ubuntu2 |
ubuntu/libppd | <2:2.0~ | 2:2.0~ |
ubuntu/libppd | <2:2.0~ | 2:2.0~ |
Apple CUPS | <2.4.7 | |
OpenPrinting libppd | =2.0-rc2 | |
Fedora | =37 | |
Fedora | =38 | |
Fedora | =39 | |
Debian | =10.0 | |
macOS | <15 | 15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-4504 is a vulnerability in CUPS and libppd that allows for a heap-based buffer overflow and possible code execution.
An attacker can exploit CVE-2023-4504 by crafting a malicious PPD PostScript document and supplying it to CUPS or libppd for processing.
CVE-2023-4504 has a severity rating of high.
Yes, CVE-2023-4504 has been fixed in CUPS version 2.4.7.
You can find more information about CVE-2023-4504 at the following links: [CVE Details](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504), [TakeOnMe](https://takeonme.org/cves/CVE-2023-4504.html), [Ubuntu Security Notice](https://ubuntu.com/security/notices/USN-6391-1).