CVE-2023-34241

CVSS 3.1 Score 7.1 of 10 (high)

Details

Published Jun 22, 2023
Updated: Nov 17, 2023
CWE ID 416

Summary

CVE-2023-34241: A use-after-free vulnerability has been identified in OpenPrinting CUPS, an open-source printing system for Linux and Unix-like operating systems. This issue, present in versions 2.0.0 through 2.4.5, arises from the logging of free memory data to the AFlogging service after a connection has been closed. This bug impacts the entire cupsd process. The root cause of the issue lies within the function `httpClose(con->http)` in `scheduler/client.c`. When this function is called, it frees the pointer, but cupsdLogClient subsequently passes the pointer to httpGetHostname. This occurs during the cupsdAcceptClient function, primarily when LogLevel is set to warn or higher, and in two scenarios: during a double-lookup for the IP address or when CUPS is compiled with TCP wrappers and the connection is refused by rules in `/etc/hosts.allow` and `/etc/hosts.deny`. This vulnerability can lead to memory corruption and potentially allow an attacker to execute arbitrary code. Version 2.4.6 includes a patch to address this issue.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • MacOS
  • OpenPrinting CUPS
  • Fedora Operating System
  • Debian

Affected Vendors

  • Apple
  • Debian
  • Fedora Project

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-34241 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions