> "This thing is packaged for anything, in some cases it’s enabled by default, in others it’s not, go figure . Full disclosure, I’ve been scanning the entire public internet IPv4 ranges several times a day for weeks, sending the UDP packet and logging whatever connected back. And I’ve got back connections from hundreds of thousands of devices, with peaks of 200-300K concurrent devices. This file contains a list of the unique Linux systems affected. Note that everything that is not Linux has been filtered out. That is why I was getting increasingly alarmed during the last few weeks."
Being able to run arbitrary code in a root account with no authentication would seem to be a pretty important security breach, although I don't think it's quite the level of danger it was built up to be.
I was going to make fun of him wasting his sabbatical on hacking a printer service but I gotta admit I'd have fallen down the same rabbit hole if I stumbled on it. It's a cool hack.
Original report
Affected Vendor:
- OpenPrinting
Affected Product - Several components of the CUPS printing system: cups-browsed, libppd, libcupsfilters and cups-filters.
Affected Version - All versions <= 2.0.1 (latest release) and master.
Significant ICS/OT impact? - no
Reporter - Simone Margaritelli [evilsocket@gmail.com]
Vendor contacted? - yes The vendor has been notified trough Github Advisories and all bugs have been confirmed:
- https://github.com/OpenPrinting/cups-browsed/security/adviso...- https://github.com/OpenPrinting/libcupsfilters/security/advi...
- https://github.com/OpenPrinting/libppd/security/advisories/G...
- https://github.com/OpenPrinting/cups-filters/security/adviso...
I'm also in contact with the Canonical security team about these issues.
Description
- The vulnerability affects many GNU/Linux distributions:
[https://pkgs.org/download/cups-browsed]Google ChromeOS:
https://chromium.googlesource.com/chromiumos/overlays/chromi...
Most BSDs:
https://man.freebsd.org/cgi/man.cgi?query=cups-browsed.conf&...
And possibly more.
<snip>
- An attacker can exploit this vulnerability if it can connect to the host via UDP port 631, which is by default bound to INADDR_ANY, in which case the attack can be entirely remote, or if it's on the same network of the target, by using mDNS advertisements.
What does an attacker gain by exploiting this vulnerability? - Remote execution of arbitrary commands when a print job is sent to the system printer.
How was the vulnerability discovered? - A lot of curiosity (when I noticed the \*:631 UDP bind I was like "wtf is this?!" and went down a rabbit hole ...) and good old source code auditing.
Is this vulnerability publicly known? - No, the bugs are not known and the FoomaticRIPCommandLine vulnerability is known to be already patched (it isn't).
Is there evidence that this vulnerability is being actively exploited? - Not to the best of my knowledge.
Original report
Affected Vendor:
- OpenPrinting
Affected Product - Several components of the CUPS printing system: cups-browsed, libppd, libcupsfilters and cups-filters.
Affected Version - All versions <= 2.0.1 (latest release) and master.
Significant ICS/OT impact? - no
Reporter - Simone Margaritelli [evilsocket@gmail.com]
Vendor contacted? - yes The vendor has been notified trough Github Advisories and all bugs have been confirmed:
- https://github.com/OpenPrinting/cups-browsed/security/adviso...- https://github.com/OpenPrinting/libcupsfilters/security/advi...
- https://github.com/OpenPrinting/libppd/security/advisories/G...
- https://github.com/OpenPrinting/cups-filters/security/adviso...
I'm also in contact with the Canonical security team about these issues.
Description
- The vulnerability affects many GNU/Linux distributions:
[https://pkgs.org/download/cups-browsed]Google ChromeOS:
https://chromium.googlesource.com/chromiumos/overlays/chromi...
Most BSDs:
https://man.freebsd.org/cgi/man.cgi?query=cups-browsed.conf&...
And possibly more.
<snip>
China is probably watching the latest developments in US support for Ukraine with great interest. If the support proves insufficient for Ukraine to win, they may conclude that there is no need for a proper invasion of Taiwan. That there is no need for an all-out war. They could just isolate the island, try to shoot down every plane and sink every ship, and take whatever casualties Americans are willing to take. If their navy and air force can match their US counterparts, they just need to spend more and last longer.
I think China would be far more aggressive with Taiwan if the West hadn't frozen Russia's central bank assets. That single move likely had the biggest impact in curtailing any expansionist dreams.