First published: Mon Sep 23 2024(Updated: )
A remote attacker who has successfully installed or hijacked an exposed printer (via UPD or mDNS) and was able to return a malicious IPP attribute, the attacker may be able to exploit FoomaticRIPCommandLine to execute arbitrary commands. Due to a lack of sanitization in `cfGetPrinterAttributes` API and `ppdCreatePPDFromIPP2`, a vulnerable CUPS system will execute the `foomatic-rip` filter binary when a print job is sent to the printer.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple CUPS | ||
OpenPrinting Foomatic-RIP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2314256 is considered a critical vulnerability due to its potential for remote code execution.
To fix REDHAT-BUG-2314256, update affected software to the latest patched version provided by the vendor.
Users of Apple CUPS and OpenPrinting FoomaticRIP are affected by REDHAT-BUG-2314256.
REDHAT-BUG-2314256 enables remote attackers to execute arbitrary commands through exploited printer attributes.
REDHAT-BUG-2314256 is caused by a lack of sanitization in the cfGetPrinterAttributes API.