CVE-2023-4504

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AHACNA
---
---
CVEADP
---
---
CISA-ADPADP
7 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
VendorProductVersion
openprintingcups
𝑥
< 2.4.7
openprintinglibppd
2.0:rc2
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cups
bullseye
2.3.3op2-3+deb11u8
fixed
bullseye (security)
2.3.3op2-3+deb11u9
fixed
bookworm
2.4.2-3+deb12u8
fixed
bookworm (security)
2.4.2-3+deb12u8
fixed
sid
2.4.10-2
fixed
trixie
2.4.10-2
fixed
libppd
bullseye
2:0.10-7.3
fixed
bookworm
2:0.10-9
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cups
oracular
Fixed 2.4.6-0ubuntu2
released
noble
Fixed 2.4.6-0ubuntu2
released
mantic
Fixed 2.4.6-0ubuntu2
released
lunar
Fixed 2.4.2-3ubuntu2.5
released
jammy
Fixed 2.4.1op1-1ubuntu4.7
released
focal
Fixed 2.3.1-9ubuntu1.6
released
bionic
Fixed 2.2.7-1ubuntu2.10+esm2
released
xenial
Fixed 2.1.3-4ubuntu0.11+esm4
released
trusty
ignored
libppd
oracular
Fixed 2:2.0~rc1-0ubuntu4
released
noble
Fixed 2:2.0~rc1-0ubuntu4
released
mantic
Fixed 2:2.0~rc1-0ubuntu4
released
lunar
Fixed 2:2.0~rc1-0ubuntu1.2
released
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored
References