|
Message-ID: <abee7270-da4f-4b9d-8916-22d1e51817f7@analygence.com> Date: Fri, 27 Sep 2024 09:34:42 -0400 From: Will Dormann <will.dormann@...lygence.com> To: oss-security@...ts.openwall.com Subject: Re: CUPS printing system vulnerabilities On 9/26/24 6:11 PM, Solar Designer wrote: >> * CVE-2024-47176 | cups-browsed <= 2.0.1 binds on UDP INADDR_ANY:631 >> trusting any packet from any source to trigger a >> Get-Printer-Attributes IPP request to an attacker controlled URL. This seems like a plausible and precise description for a vulnerability. Yet the actual CVE entry is "cups-browsed bugs and other bugs can combine, leading to info leak and remote code execution" <https://github.com/CVEProject/cvelistV5/blob/07723f33d3792d747b650a873346400ca5dc2034/cves/2024/47xxx/CVE-2024-47176.json#L15> and several unrelated CWEs are listed. Isn't using a single CVE to capture what can happen when multiple vulnerabilities are chained together... frowned upon? <https://cve.mitre.org/cve/list_rules_and_guidance/counting_rules.html> -- Will Dormann | Senior Vulnerability Analyst ANALYGENCE, Inc. 8115 Maple Lawn Blvd., Suite 110, Fulton, MD 20759 t 412.818.3452 | f 301.812.4252 e will.dormann@...lygence.com | w analygence.com
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.