cve/2023/CVE-2023-32324.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-32324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324)
![](https://img.shields.io/static/v1?label=Product&message=cups&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%202.4.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%3A%20Out-of-bounds%20Write&color=brighgreen)
### Description
OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.
### POC
#### Reference
- https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
#### Github
- https://github.com/seal-community/patches