CVE-2023-34241
CVSS 3.1 Score 7.1 of 10 (high)
Details
Summary
CVE-2023-34241: A use-after-free vulnerability has been identified in OpenPrinting CUPS, an open-source printing system for Linux and Unix-like operating systems. This issue, present in versions 2.0.0 through 2.4.5, arises from the logging of free memory data to the AFlogging service after a connection has been closed. This bug impacts the entire cupsd process. The root cause of the issue lies within the function `httpClose(con->http)` in `scheduler/client.c`. When this function is called, it frees the pointer, but cupsdLogClient subsequently passes the pointer to httpGetHostname. This occurs during the cupsdAcceptClient function, primarily when LogLevel is set to warn or higher, and in two scenarios: during a double-lookup for the IP address or when CUPS is compiled with TCP wrappers and the connection is refused by rules in `/etc/hosts.allow` and `/etc/hosts.deny`. This vulnerability can lead to memory corruption and potentially allow an attacker to execute arbitrary code. Version 2.4.6 includes a patch to address this issue.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Affected Products
- MacOS
- OpenPrinting CUPS
- Fedora Operating System
- Debian
Affected Vendors
- Apple
- Debian
- Fedora Project