CUPS Printing Systems Remote Code Execution Vulnerability (CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, & CVE-2024-47177) – Qualys ThreatPROTECT
Common Information
Type Value
UUID 02f5c63a-b037-4be9-b39f-eed3b2dd3675
Fingerprint b4b8b502e1338387
Analysis status DONE
Considered CTI value 2
Text language
Published Sept. 27, 2024, 4:34 a.m.
Added to db Sept. 27, 2024, 2:59 p.m.
Last updated Dec. 11, 2024, 10:04 a.m.
Headline CUPS Printing Systems Remote Code Execution Vulnerability (CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, & CVE-2024-47177)
Title CUPS Printing Systems Remote Code Execution Vulnerability (CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, & CVE-2024-47177) – Qualys ThreatPROTECT
Detected Hints/Tags/Attributes 41/1/12
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 254 Qualys ThreatPROTECT https://threatprotect.qualys.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 73
cve-2024-47176
Details CVE 59
cve-2024-47076
Details CVE 55
cve-2024-47175
Details CVE 60
cve-2024-47177
Details Domain 8
www.evilsocket.net
Details Domain 4283
github.com
Details Github username 9
openprinting
Details Url 4
https://www.evilsocket.net/2024/09/26/attacking-unix-systems-via-cups-part-i
Details Url 6
https://github.com/openprinting/libppd/security/advisories/ghsa-7xfx-47qg-grp6
Details Url 7
https://github.com/openprinting/cups-browsed/security/advisories/ghsa-rj88-6mr5-rcw8
Details Url 6
https://github.com/openprinting/cups-filters/security/advisories/ghsa-p9rh-jxmq-gq47
Details Url 6
https://github.com/openprinting/libcupsfilters/security/advisories/ghsa-w63j-6g73-wmg5