Possible Linux Severe CVSS 9.9/10 Unauthenticated RCE Flaw - GNU/Linuxcels: make sure to keep your systems up to date

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
It's from the new print job creation specifically after chaining together everything else in the first place
Yeah it requires the target machine to actually print something, which reduces the severity of this exploit quite a bit. Although the main problem seems to be cups-browsed listening to the public internet regardless of how you have CUPS configured.

e: btw you also have to print from the mysterious new PPD printer that just showed up
 
Last edited:
Before any Windows/Apple users come by and drop the expected:

"Well well well, who's got the secure OS now?"
-:smug:
Considering how things went for Microsoft this last summer as far as security issues, I think it would behoove windows users to be polite about it
 
It is very obvious that printers as a whole have been a mistake, and that they should only be used by putting a PDF on a flashdrive then plugging it directly into the printer, which is far easier than trying to configure the printer to print from a computer in most cases anyways.
 
The RCE is not good, but it was blown way out of proportion and is mostly nothing.

I think that the entry points matter, and the context matters when you evaluate something like this.

While this is an actual bug in the software, it's not like it will affect literally all unix systems and you can just use this to get into anywhere if you have the knowhow. You specifically need cups to be installed and exposed to the internet. Enterprise servers have minimal installations which don't include cups, and home users have router firewalls that don't have those ports opened by default.

Are there tons of idiots who do the opposite with random software? Sure, someone found remote controlling software unauthed earlier in the thread, but how many cups servers will you really find on shodan?

Entry Points​

  • WAN / public internet: a remote attacker sends an UDP packet to port 631. No authentication whatsoever.
  • LAN: a local attacker can spoof zeroconf / mDNS / DNS-SD advertisements (we will talk more about this in the next writeup ) and achieve the same code path leading to RCE.

If you have port 631 open, why the fuck? If you put cups on the public internet without authentication, then that's your problem! Don't put anything on the public internet without auth unless it's supposed to be public.

If someone has LAN access, then there's far more to worry about than cups. All the locks in the world on your cupboards won't protect your shit if someone is already in your house.
 
I swear I need to remember that Josh normally complains about image files being too large for their purposes, I was having an aneurysm trying to figure out why this video wasn't close to or less than 10MB in size.

This is a decent summary and demonstration of the vulnerability as well as why RHEL and security firms were giving the preliminary CVSS of almost 10/10.
 
It is very obvious that printers as a whole have been a mistake, and that they should only be used by putting a PDF on a flashdrive then plugging it directly into the printer, which is far easier than trying to configure the printer to print from a computer in most cases anyways.
Unironically, yes. Fuck Micro$oft Word and its ZIPfuls of XML faggotry: give me immutable 'fuck you' documents and LaTeX.
 
I swear I need to remember that Josh normally complains about image files being too large for their purposes, I was having an aneurysm trying to figure out why this video wasn't close to or less than 10MB in size.
View attachment 6462178
This is a decent summary and demonstration of the vulnerability as well as why RHEL and security firms were giving the preliminary CVSS of almost 10/10.
oh boy let me just watch a 14 minute video instead of just quickly checking the actual releases
 
Is the 9.x severity truly necessary?

I understand that in technically it works for all linux systems but its in such a specific scope. For CUPS to be exposed to the internet is such a niche case. I'll put XMR on the fact this easily gets downgraded afterwards from its CVE rating.
 
Back