News: 0001494146

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Unauthenticated RCE Flaw With CVSS 9.9 Rating For Linux Systems Affects CUPS

([Linux Security] 111 Minutes Ago Unauthenticated RCE Vulnerability)


There's been much speculation since this morning over a reported "severe" unauthenticated remote code execution (RCE) flaw affecting Linux systems that carries a CVSS 9.9.9 score... The embargo has now lifted with the details on this nasty issue.

There's been talk of this unauthenticated RCE vulnerability coming with a CVSS 9.9 rating but none of the technical details were publicly known until it was made public just now at the top of the hour. Simone Margaritelli discovered this vulnerability and has shared a write-up around this potentially very impactful Linux vulnerability.

This vulnerability, fortunately, doesn't affect the Linux kernel but rather CUPS... The print server commonly used on Linux systems and other platforms.

Margaritelli sums up the vulnerability in [1]a blog post as:

"A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started (from that computer)."

CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177 have been assigned around these CUPS issues. There are also "several other bugs that are more or less exploitable."

This remote code execution issue can be exploited across the public Internet via a UDP packet to port 631 without needing any authentication, assuming the CUPS port is open through your router/firewall. LAN attacks are also possible via spoofing zeroconf / mDNS / DNS-SD advertisements.

Besides CUPS being used on Linux distributions, it also affects some BSDs, Oracle Solaris, Google Chrome OS, and others.

As of writing there is no Linux fix available for this high profile security issue. In the meantime it's recommended to disable and remove the "cups-browsed" service, updating CUPS, or at least blocking all traffic to UDP port 631.

More details on this CUPS security issue via [2]this blog post by researcher Simone Margaritelli.

Red Hat has also published [3]a blog post with their response to these CUPS vulnerabilities. Mitigating RHEL servers is done by disabling cups-browsed.



[1] https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

[2] https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

[3] https://www.redhat.com/en/blog/red-hat-response-openprinting-cups-vulnerabilities



Lbibass

Errinwright

debrouxl

Juke1349

debrouxl

Espionage724

energyman

thomasjkenney

Those who sweat in flames of hell, Leaden eared, some thought their bowels
Here's the reason that they fell: Lispeth forth the sweetest vowels.
While on earth they prayed in SAS, These they offered up in praise
PL/1, or other crass, Thinking all this fetid haze
Vulgar tongue. A rapsody sung.

Some the lord did sorely try Jabber of the mindless horde
Assembling all their pleas in hex. Sequel next did mock the lord
Speech as crabbed as devil's crable Slothful sequel so enfangled
Hex that marked on Tower Babel Its speaker's lips became entangled
The highest rung. In his bung.

Because in life they prayed so ill
And offered god such swinish swill
Now they sweat in flames of hell
Sweat from lack of APL
Sweat dung!