Published on September 27, 2024Documentation Index
Fetch the complete documentation index at: https://help.onetsolutions.net/llms.txt
Use this file to discover all available pages before exploring further.
Why the perimeter is narrower than the headlines suggested
When this CVE bundle was disclosed, the headlines screamed “9.9 out of 10” and “critical Linux vulnerability”. The reality is more nuanced:- The flaw is not exploitable without
cups-browsedrunning. cups-browsedis not installed by default on most production servers (it is a desktop-environment dependency, not a web-server one).- Even with
cups-browsedrunning, RCE only fires when a user prints to the malicious printer.
The attack chain
CUPS listens on631/UDP when cups-browsed is active. The attacker sends an IPP (Internet Printing Protocol) packet announcing a remote printer. cups-browsed automatically registers it on the target server. From that point, the printer shows up in the system’s printer list.
When a user prints to that printer (by mistake, by confusing it with a legitimate one, or because its name imitates a real printer), CUPS builds a print command from the IPP attributes the attacker provided. Some of those attributes are not validated: they can contain shell commands that get executed with the rights of the CUPS daemon.
Are you affected?
Check two things on each host:cups-browsed≤ 2.0.1cups-filters≤ 2.0.1libcupsfilters≤ 2.1b1libppd≤ 2.1b1
Mitigation
Clean fix: disable cups-browsed if you do not need it
On a server, this is almost always the right move:Middle ground: restrict discovery
Ifcups-browsed must stay active, disable automatic discovery of remote printers through BrowseRemoteProtocols.
Edit /etc/cups/cups-browsed.conf:
dnssd cups.)
Then:
Network layer
Block631/UDP on the firewall from the internet and from any shared, untrusted network.
Patching
Track the patch status through your distribution:- Ubuntu: follow the Ubuntu Security tracker for
cups-filters. - Debian:
apt list --upgradable | grep -i cups. - RHEL/AlmaLinux:
dnf check-update cups\*.
Wrap-up
On a typical production server (web, database, cache), you are probably unaffected. On a Linux workstation or a desktop-style container, checkcups-browsed, disable it if you can, patch otherwise.
For questions, open a ticket from your OnetSolutions client area.
