8.1 C
London
Saturday, September 28, 2024

Pwned by Your Printer: Simone Margaritelli Warns of a Severe Safety Vulnerability in CUPS



Safety researcher Simone Margaritelli has found severe safety vulnerabilities within the Widespread UNIX Printing System (CUPS) — permitting for remote-code execution over a community on Linux and BSD distributions with CUPS put in and enabled.

“A distant unauthenticated attacker can silently substitute current printers’ (or set up new ones) IPP [Internet Printing Protocol] URLs with a malicious one, leading to arbitrary command execution (on the pc) when a print job is began (from that laptop),” Margaritelli explains of the core of the issue. “A distant attacker [just] sends a UDP packet to port 631. No authentication by any means.”

CUPS is, because the identify suggests, used to permit native and community printing on UNIX-like techniques. Initially developed by Straightforward Software program Merchandise and adopted by Apple in 2002 for Mac OS X, it is the commonest printing system for non-Microsoft Home windows working techniques and used on Linux, BSD, Solaris, and different platforms — making a safety flaw that enables for unauthenticated distant code execution extreme certainly, with Margaritelli’s discovery rated at 9 out of 10 for severity.

“This factor is packaged for something, in some circumstances it is enabled by default, in others it isn’t, go determine,” Margaritelli writes. “Full disclosure, I’ve been scanning your complete public web IPv4 ranges a number of instances a day for weeks, sending the UDP packet and logging no matter related again. And I’ve received again connections from a whole lot of hundreds of gadgets, with peaks of 200-300k concurrent gadgets.”

The exploit works in opposition to “most” Linux distributions, “some” BSD distributions, Solaris, and doubtlessly extra UNIX-like platforms. (📹: Simone Margaritelli)

Margaritelli considers the flaw extreme sufficient to “take away any CUPS service, binary and library from any of my techniques and by no means once more use a UNIX system to print” — however others are downplaying the vulnerability, whereas patches to shut the opening have already been launched. “On the whole,” writes “senior technophilosopher” Xe Iaso on his weblog, “your servers shouldn’t be weak to this. Your desktops could also be.” Johannes Ullrich on the SANS Web Storm Heart, in the meantime, recommends filtering UDP site visitors on port 631 — which is able to block assaults from exterior the native community even on an unpatched system.

Extra particulars on the vulnerability and its discovery — together with a accountable disclosure course of that Margaritelli describes as “damaged” and which he has stated he is not going to be following for future vulnerabilities — is out there on Margaritelli’s weblog; these operating CUPS on their techniques are suggested to take away it if they don’t require printing help or to verify for a patch, whereas additionally guaranteeing UDP port 631 will not be accessible over the web.

Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here