First published: Mon Sep 23 2024(Updated: )
A remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) and was able to return a malicious IPP attribute, the attacker may be able to exploit FoomaticRIPCommandLine to execute arbitrary commands. Due to a lack of sanitization in `cfGetPrinterAttributes` API and `ppdCreatePPDFromIPP2`, a vulnerable CUPS system will execute the `foomatic-rip` filter binary when a print job is sent to the printer.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix SDC | ||
debian/cups | <=2.3.3op2-3+deb11u8 | 2.3.3op2-3+deb11u9 2.4.2-3+deb12u8 2.4.10-2 |
debian/libppd | 2:0.10-7.3 2:0.10-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.