Security Vulnerability: remote code execution via cups-browsed (CVE-2024-47177, CVE-2024-47175, CVE-2024-47176, CVE-2024-47076)
This document (000021571) is provided subject to the disclaimer at the end of this document.
Environment
For a comprehensive list of affected products please review the SUSE security announcements:
https://www.suse.com/security/cve/CVE-2024-47076.html
https://www.suse.com/security/cve/CVE-2024-47175.html
https://www.suse.com/security/cve/CVE-2024-47176.html
https://www.suse.com/security/cve/CVE-2024-47177.html
SUSE Liberty Linux 7
SUSE Liberty Linux 8
SUSE Liberty Linux 9
Situation
If the "cups-browsed" service is enabled, and its listening port UDP 631 is not blocked by the firewall, cups-browsed accepts CUPS requests from the network. These CUPS requests can inject printer metadata into the print system. The CUPS stack did not filter out metacharacters, so the injected printer data could be used for a shell code injection attack.
Note this vulnerability is unlikely to work across network gateway boundaries or any NATed setups.
SUSE does not enable the cups-browsed.service by default.
Resolution
Possible Workarounds:
1.) Block port 631 UDP in firewall if not already blocked.
2.) Disable cups-browsed.service if its running. Use
systemctl status cups-browsed.serviceto verify the status and to stop and disable it:
systemctl stop cups-browsed.service systemctl disable cups-browsed.service
3.) cups-browsed is part of the cups-filters RPM. If it is not required, an option is to remove the package:
zypper rm cups-filters
Status
Additional Information
https://en.opensuse.org/SDB:CUPS_and_SANE_Firewall_settings
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000021571
- Creation Date: 27-Sep-2024
- Modified Date:27-Sep-2024
-
- SUSE Linux Enterprise Desktop
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Manager Server
- SUSE Linux Enterprise Micro
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com