www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3005
Public Scan
URL:
https://www.tenable.com/plugins/nessus/208004
Submission: On October 16 via api from IN — Scanned from US
Submission: On October 16 via api from IN — Scanned from US
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 208004 1. Nessus SLACKWARE LINUX 15.0 / CURRENT CUPS-FILTERS VULNERABILITY (SSA:2024-275-01) MEDIUM NESSUS PLUGIN ID 208004 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote Slackware Linux host is missing a security update to cups-filters. DESCRIPTION The version of cups-filters installed on the remote host is prior to 1.28.17 / 2.0.1. It is, therefore, affected by a vulnerability as referenced in the SSA:2024-275-01 advisory. - CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups- browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. (CVE-2024-47176) - cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 trusting any packet from any source to trigger a Get- Printer-Attributes IPP request to an attacker controlled URL. (CVE-2024-47176) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. SOLUTION Upgrade the affected cups-filters package. SEE ALSO http://www.nessus.org/u?a546b7da PLUGIN DETAILS Severity: Medium ID: 208004 File Name: Slackware_SSA_2024-275-01.nasl Version: 1.2 Type: local Family: Slackware Local Security Checks Published: 10/1/2024 Updated: 10/3/2024 Supported Sensors: Nessus RISK INFORMATION VPR Risk Factor: Medium Score: 4.7 CVSS V2 Risk Factor: High Base Score: 7.8 Temporal Score: 6.1 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N CVSS Score Source: CVE-2024-47176 CVSS V3 Risk Factor: Medium Base Score: 5.3 Temporal Score: 4.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C VULNERABILITY INFORMATION CPE: p-cpe:/a:slackware:slackware_linux:cups-browsed, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:15.0, p-cpe:/a:slackware:slackware_linux:cups-filters Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages Exploit Available: true Exploit Ease: Exploits are available Patch Publication Date: 10/1/2024 Vulnerability Publication Date: 9/26/2024 REFERENCE INFORMATION CVE: CVE-2024-47176 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance Tenable Cloud Risk Report 2024