First published: Mon Sep 23 2024(Updated: )
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix SDC | ||
debian/cups-filters | <=1.28.7-1+deb11u2 | 1.28.7-1+deb11u3 1.28.17-3+deb12u1 1.28.17-5 |
debian/libcupsfilters | 2.0.0-3 | |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Cortex XDR | ||
Palo Alto Networks Cortex XDR agent | ||
Palo Alto Networks GlobalProtect app | ||
Palo Alto Networks Cortex XSIAM | ||
Palo Alto Networks Cortex XSOAR | ||
Palo Alto Networks PAN-OS | ||
Palo Alto Networks Prisma Access | ||
Palo Alto Networks Prisma Access Browser | ||
Palo Alto Networks Prisma Cloud Compute | ||
Palo Alto Networks Prisma Cloud | ||
Palo Alto Networks Prisma SD-WAN |
Customers who decide to block CUPS traffic can create a Security policy rule (Policies > Security) that targets the "cups" application. Refer to the information about creating Security policy rules: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/security-policy/create-a-security-policy-rule
No software updates are required at this time.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)