{"id":"CVE-2024-47076","summary":"libcupsfilters's cfGetPrinterAttributes5 does not validate IPP attributes returned from an IPP server","details":"CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.","modified":"2026-04-16T04:34:37.348555354Z","published":"2024-09-26T21:18:22.067Z","related":["ALSA-2024:7346","ALSA-2024:7463","GHSA-7xfx-47qg-grp6","GHSA-p9rh-jxmq-gq47","GHSA-rj88-6mr5-rcw8","GHSA-w63j-6g73-wmg5","SUSE-SU-2024:3863-1","openSUSE-SU-2025:15563-1"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-20"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47076.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00048.html"},{"type":"WEB","url":"https://www.cups.org"},{"type":"WEB","url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47076.json"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47076"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20241011-0001/"},{"type":"FIX","url":"https://github.com/OpenPrinting/libcupsfilters/commit/95576ec3d20c109332d14672a807353cdc551018"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openprinting/cups-browsed","events":[{"introduced":"0"},{"last_affected":"089450357e61673fa9871b927c4b3b6cea4690a1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1b1"}]}}],"versions":["2.0.0","2.0.1","2.0b1","2.0b2","2.0b3","2.0b4","2.0rc1","2.0rc2","2.1.0","2.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47076.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/openprinting/libcupsfilters","events":[{"introduced":"0"},{"last_affected":"a75f7e5acb22db5fa8c939889c31ae61c64ce7ad"},{"fixed":"95576ec3d20c109332d14672a807353cdc551018"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.0"}]}}],"versions":["2.0.0","2.0b1","2.0b2","2.0b3","2.0b4","2.0rc1","2.0rc2","2.1b1"],"database_specific":{"vanir_signatures_modified":"2026-04-12T11:59:24Z","vanir_signatures":[{"signature_type":"Line","target":{"file":"cupsfilters/ipp.c"},"source":"https://github.com/openprinting/libcupsfilters/commit/95576ec3d20c109332d14672a807353cdc551018","signature_version":"v1","deprecated":false,"id":"CVE-2024-47076-1f7f608d","digest":{"line_hashes":["161359513121773949907926455193830173566","154108727522163752832459989576150002054","303212411057175221772250729228838139471","10013934268424892536252883675686381330"],"threshold":0.9}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47076.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"}]}