Friday, September 27th 2024

New Linux RCE Vulnerability Leaks Ahead of Disclosure - Allows Arbitrary Code Execution via CUPS Print Scheduler

A new vulnerability was recently discovered in a widely used print server that is installed by default on many Linux and Unix-based systems with a graphical user interface. The primary attack vector for the vulnerability is the CUPS (Common Unit Printing System) print scheduler, specifically cups-browsed, and has the potential to execute code remotely with zero user interaction required.

The vulnerability has reportedly been given a CVSS score of 9.9 by RHEL and Canonical, although this score is hotly debated, with some arguing it should have a lower score, because, although code can be remotely downloaded to the system, it cannot be executed without user intervention. Fortunately, there is no evidence of the vulnerability having been exploited, although the disclosure was leaked online ahead of a planned private reveal in October, prompting the developer that discovered the vulnerability to post the full explanation in a write-up on their blog. This being the case, the vulnerability could very well start being exploited by malicious actors.
According to the lengthy blog post by the researcher, Simone Margaritelli, services related to the CUPS printing system on are vulnerable to remote code execution. Essentially, an attacking system convinces the print scheduler that it is a printer and sends over malware—which can be arbitrary executable code—that is disguised as a printer configuration file. This process requires no user intervention, since CUPS will accept any packet sent via port *:631. The next time the user attempts to print something, that code can be executed, potentially compromising the system.
Summary
  • CVE-2024-47176 | cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 trusting any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker controlled URL.
  • CVE-2024-47076 | libcupsfilters <= 2.1b1 cfGetPrinterAttributes5 does not validate or sanitize the IPP attributes returned from an IPP server, providing attacker controlled data to the rest of the CUPS system.
  • CVE-2024-47175 | libppd <= 2.1b1 ppdCreatePPDFromIPP2 does not validate or sanitize the IPP attributes when writing them to a temporary PPD file, allowing the injection of attacker controlled data in the resulting PPD.
  • CVE-2024-47177 | cups-filters <= 2.0.1 foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter.
The specific exploit depends on a host of unpatched vulnerabilities, some over a decade old, making this a particularly concerning issue for those using Linux or Unix-based. For this attack vector to work, the system needs to have CUPS (Common Unix Printing System) and cups-browsed installed and running, which is the default for a lot of systems. According to Margaritelli, there are 200,000-300,000 systems with the print service currently connected to the internet, although Shodan reports (see above screenshot) that there are around 76,000 systems with open CUPS ports connected to the internet.

While the researcher claims that most GNU/Linux distributions—as well as potentially ChromeOS and macOS—are affected, it should be noted that it is not the default configuration for many Linux distributions, and it especially shouldn't be the case for any large-scale servers or data centers, meaning the largest target group would be private PC users running Linux.
Sources: Evilsocket Blog, Stong on GitHub Gist, Shodan
Add your own comment

31 Comments on New Linux RCE Vulnerability Leaks Ahead of Disclosure - Allows Arbitrary Code Execution via CUPS Print Scheduler

#2
Shihab
lexluthermiesterOk, so disabling CUPS seems the order of the day.
Or update your system. My 24.04 got the patches yesterday's afternoon.
Although I did disable it as well, don't need printing. And I already have ufw on, which blocks inbound connections by default.
Posted on Reply
#3
_roman_
The bug report in my words.

Read the config files and change them after installing a package. This was not done!
Only install packages you need.
The news title is wrong. Cups is not broken. Cups-browsed is broken. My gentoo box has the cups-browsed package not installed - but i can print and i can print to pdf.

The bad attitude of bug readers. The bad attitude of many when hinting out issues.

I recommend to make those bugs instantly public after 3 calendar days.

I want to thanks the person who wrote up how he found it.
Posted on Reply
#4
AusWolf
Why does the print port have to be connected to the internet anyway?
Posted on Reply
#5
ncrs
_roman_The bug report in my words.

Read the config files and change them after installing a package. This was not done!
Only install packages you need.
The news title is wrong. Cups is not broken. Cups-browsed is broken. My gentoo box has the cups-browsed package not installed - but i can print and i can print to pdf.

The bad attitude of bug readers. The bad attitude of many when hinting out issues.

I recommend to make those bugs instantly public after 3 calendar days.

I want to thanks the person who wrote up how he found it.
This issue is absolutely a CUPS bug.
Not the part that it listens to IPP announcement packets by default - Windows (in Private networks) and macOS do this as well in order to meet user expectations that connecting a modern networked printer will make it magically appear in systems on said network.
The broken part is parsing of those IPP packets in CUPS which leads to RCE because there isn't enough sanitization done on the data they carry. The person who discovered those bugs wrote in the blog that what was made public aren't the only problems he found, so we can expect more reports, and that macOS is also affected.
Just because your custom Gentoo installation doesn't include cups-browsed doesn't mean that it isn't installed by default by more mainstream distributions like Ubuntu, because it is.
AusWolfWhy does the print port have to be connected to the internet anyway?
It shouldn't, in theory.
I think that those detected computers might be Ubuntu or any other mainstream desktop Linux distribution that has been installed on a server instead of using a server distribution. Since Ubuntu installs the vulnerable component by default in their desktop variant, their users might simply not know it's even there. Not everyone is a Linux expert, and installation of a desktop distribution on server that's directly Internet-facing suggests that they aren't either.
In my opinion the automatic discovery should be limited to private networks only, just like it is on Windows. That's an issue of CUPS configuration which is on the distribution maintainer, but it's no excuse for the lax parsing of IPP packets in CUPS.
Posted on Reply
#6
Event Horizon
Installed the security fix for this yesterday. I had cups-browsed installed by default. Latest Linux Mint.
Posted on Reply
#7
AusWolf
Event HorizonInstalled the security fix for this yesterday. I had cups-browsed installed by default. Latest Linux Mint.
So it already has a fix? That's good to know. :)
Posted on Reply
#8
trsttte
Because why would Windows get all the fun of having a bunch of security holes because of stupid printer software :D
Posted on Reply
#9
wNotyarD
trsttteBecause why would Windows get all the fun of having a bunch of security holes because of stupid printer software :D
When/wherever there's printers involved, there's hell to follow.
Posted on Reply
#10
lexluthermiester
AusWolfWhy does the print port have to be connected to the internet anyway?
Network printing. It's not so much internet connected as it is network connected that has internet awareness.
Posted on Reply
#11
Steevo
Print vulnerabilities existed in Windows for years and they were ignored for user convenience and so cheap printers could be made
Posted on Reply
#12
lexluthermiester
SteevoPrint vulnerabilities existed in Windows for years and they were ignored for user convenience and so cheap printers could be made
They were a non-issue if you blocked the print service from internet access.
Posted on Reply
#13
Pepamami
cups-browsed is not so common
Posted on Reply
#14
Space Lynx
Astronaut
lexluthermiesterOk, so disabling CUPS seems the order of the day.
@Easy Rhino @Solaris17

what is the command line I need to use to disable this and printer entirely in Linux Mint 22? I don't even need printing capability for my laptop, i'd rather it just be gone entirely to mitigate any security issues.
Posted on Reply
#15
lexluthermiester
Space Lynx@Easy Rhino @Solaris17

what is the command line I need to use to disable this and printer entirely in Linux Mint 22? I don't even need printing capability for my laptop, i'd rather it just be gone entirely to mitigate any security issues.
First you need to stop the CUPS service;

systemctl stop cups

Then you need to disable all of the associated systemd services;

systemctl disable cups.service cups.socket cups.path

Then you need to mask it so nothing else starts it;

systemctl mask cups

Then after a reboot you can make sure this procedure was successful by checking the status;

systemctl status cups
Posted on Reply
#16
Space Lynx
Astronaut
lexluthermiesterFirst you need to stop the CUPS service;

systemctl stop cups

Then you need to disable all of the associated systemd services;

systemctl disable cups.service cups.socket cups.path

Then you need to mask it so nothing else starts it;

systemctl mask cups

Then after a reboot you can make sure this procedure was successful by checking the status;

systemctl status cups
ty, i just updated linux mint 22 about an hr ago and i noticed CUPS had an update on there, so i wonder if they already patched this out?

i think im still going to do this though, because i literally have no need for a printer for my work laptop
Posted on Reply
#17
lexluthermiester
Space Lynxty, i just updated linux mint 22 about an hr ago and i noticed CUPS had an update on there, so i wonder if they already patched this out?

i think im still going to do this though, because i literally have no need for a printer for my work laptop
Yeah better safe than sorry, especially if you're not using it.
Posted on Reply
#18
R-T-B
AusWolfWhy does the print port have to be connected to the internet anyway?
It has to be connected to the network, not the internet. Feel free to firewall it.
Posted on Reply
#19
lexluthermiester
R-T-BIt has to be connected to the network, not the internet. Feel free to firewall it.
I was wondering if IPTables would work.. Wouldn't CUPS just tunnel through another connected service?
Posted on Reply
#20
Space Lynx
Astronaut
R-T-BIt has to be connected to the network, not the internet. Feel free to firewall it.
doesn't it automatically connect to the printer on your local network? i know when i installed linux mint 22 when it launched, it showed my dads HP printer already ready to go, and I did NOT give it permission to add a printer, that is one thing I do like about windows, it does not automatically add a printer unless i ask it to find one.

so if im traveling with my work laptop... connecting to various wifi networks, gg ?
Posted on Reply
#21
ncrs
Space Lynxdoesn't it automatically connect to the printer on your local network? i know when i installed linux mint 22 when it launched, it showed my dads HP printer already ready to go, and I did NOT give it permission to add a printer, that is one thing I do like about windows, it does not automatically add a printer unless i ask it to find one.
CUPS used the exact mechanism which bugs discussed in this thread affect to add that HP printer automatically.
Windows does this as well, but only on networks marked as "Private". When you first connect to a new network it will ask if you want to enable this feature for said network.
Space Lynxso if im traveling with my work laptop... connecting to various wifi networks, gg ?
Yes, CUPS as shipped by most distributions will do this on any network. It's part of the reason this got a 9.9/10 rating. It's a configuration problem that should be resolved by distribution maintainers. It can be changed by the user, but most don't even know this is happening.
lexluthermiesterI was wondering if IPTables would work.. Wouldn't CUPS just tunnel through another connected service?
This issue requires CUPS to listen on the * address (meaning all local IPv4 and v6 addresses), UDP port 631, for printers (or "printers") to connect to it. If you forbid external incoming connections to it by using iptables it will solve the issue. A side effect is disablement of the automatic printer discovery mechanism. Such configuration will still allow you to use external printers by manually adding them since then CUPS is connecting to the printer, as in it's an outgoing connection.
Posted on Reply
#22
Space Lynx
Astronaut
ncrsCUPS used the exact mechanism which bugs discussed in this thread affect to add that HP printer automatically.
Windows does this as well, but only on networks marked as "Private". When you first connect to a new network it will ask if you want to enable this feature for said network.

Yes, CUPS as shipped by most distributions will do this on any network. It's part of the reason this got a 9.9/10 rating. It's a configuration problem that should be resolved by distribution maintainers. It can be changed by the user, but most don't even know this is happening.


This issue requires CUPS to listen on the * address (meaning all local IPv4 and v6 addresses), UDP port 631, for printers (or "printers") to connect to it. If you forbid external incoming connections to it by using iptables it will solve the issue. A side effect is disablement of the automatic printer discovery mechanism. Such configuration will still allow you to use external printers by manually adding them since then CUPS is connecting to the printer, as in it's an outgoing connection.
ty for this, very informative. I honestly have no need for a printer, so I will just follow the steps from Lex and remove the entire CUPS thingy in terminal
Posted on Reply
#23
NoLoihi
Space LynxI honestly have no need for a printer, so I will just follow the steps from Lex and remove the entire CUPS thingy in terminal
Just to make obvious things obvious, if you don’t want that software at all, uninstall it via your package manager. In addition to that, if you mask a service, you won’t need to disable it.
Posted on Reply
#24
lexluthermiester
NoLoihiIn addition to that, if you mask a service, you won’t need to disable it.
Good to know!
Posted on Reply
#25
Space Lynx
Astronaut
lexluthermiesterGood to know!
so I just look for something called CUPS when I open up the Mint Store? does this change the command line i need to use to uninstall it that you gave me?
Posted on Reply
Add your own comment
Dec 18th, 2024 23:34 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts