CVE-2024-47175

CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
GitHub_MCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
Debian logo
Debian Releases
Debian Product
Codename
cups
bullseye
vulnerable
bullseye (security)
2.3.3op2-3+deb11u9
fixed
bookworm
2.4.2-3+deb12u8
fixed
bookworm (security)
2.4.2-3+deb12u8
fixed
sid
2.4.10-2
fixed
trixie
2.4.10-2
fixed
libppd
bullseye
2:0.10-7.3
fixed
bookworm
2:0.10-9
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cups
noble
Fixed 2.4.7-1.2ubuntu7.3
released
jammy
Fixed 2.4.1op1-1ubuntu4.11
released
focal
Fixed 2.3.1-9ubuntu1.9
released
bionic
Fixed 2.2.7-1ubuntu2.10+esm6
released
xenial
Fixed 2.1.3-4ubuntu0.11+esm8
released
libppd
noble
Fixed 2:2.0.0-0ubuntu4.1
released
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected