CVE-2024-47175

EUVD-2024-42297
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
GitHub_MCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
Affected Products (NVD)
VendorProductVersion
openprintinglibppd
𝑥
≤ 2.0.0
openprintinglibppd
2.1:beta1*
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cups
bookworm
2.4.2-3+deb12u8
fixed
bookworm (security)
2.4.2-3+deb12u9
fixed
bullseye
vulnerable
bullseye (security)
2.3.3op2-3+deb11u10
fixed
forky
2.4.16-1
fixed
sid
2.4.16-1
fixed
trixie
2.4.10-3+deb13u2
fixed
trixie (security)
2.4.10-3+deb13u1
fixed
libppd
bookworm
2:0.10-9
fixed
bullseye
2:0.10-7.3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cups
bionic
Fixed 2.2.7-1ubuntu2.10+esm6
released
focal
Fixed 2.3.1-9ubuntu1.9
released
jammy
Fixed 2.4.1op1-1ubuntu4.11
released
noble
Fixed 2.4.7-1.2ubuntu7.3
released
xenial
Fixed 2.1.3-4ubuntu0.11+esm8
released
libppd
bionic
not-affected
focal
not-affected
jammy
not-affected
noble
Fixed 2:2.0.0-0ubuntu4.1
released
xenial
not-affected