Lucene search

K
cve[email protected]CVE-2023-4504
HistorySep 21, 2023 - 11:15 p.m.

CVE-2023-4504

2023-09-2123:15:12
CWE-787
CWE-122
web.nvd.nist.gov
231
cve-2023-4504
cups
libppd
buffer overflow
code execution
security vulnerability

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.4%

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

Affected configurations

NVD
Node
openprintingcupsRange<2.4.7
OR
openprintinglibppdMatch2.0rc2linux
Node
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38
OR
fedoraprojectfedoraMatch39
Node
debiandebian_linuxMatch10.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CUPS",
    "vendor": "OpenPrinting",
    "versions": [
      {
        "lessThan": "2.4.6",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "libppd",
    "vendor": "OpenPrinting",
    "versions": [
      {
        "lessThan": "d09348b",
        "status": "affected",
        "version": "0",
        "versionType": "git"
      }
    ]
  }
]

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.4%