CVE-2024-47177 CUPS browsed issues
There’s been a lot of noise about a family of CUPS security issues, one listing:
- CVE-2024-47176 - cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 trusting any packet from any source to trigger a Get-Printer-Attributes IPP request to an attacker-controlled URL
- CVE-2024-47076 - libcupsfilters <= 2.1b1 cfGetPrinterAttributes5 does not validate or sanitize the IPP attributes returned from an IPP server, providing attacker-controlled data to the rest of the CUPS system
- CVE-2024-47175 - libppd <= 2.1b1 ppdCreatePPDFromIPP2 does not validate or sanitize the IPP attributes when writing them to a temporary PPD file, allowing the injection of attacker-controlled data in the resulting PPD
- CVE-2024-47177 - cups-filters <= 2.0.1 foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter
Obviously for a system not directly accessible outside one’s local network the risks are somewhat limited (as noted by Red Hat) but nonetheless, seems like there should be some formal Apple comments and advise. Am I just not spotting it?
MacBook Pro 16″, macOS 15.0