CVE-2023-4504

Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
References
Link Resource
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 Release Notes
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h Exploit Vendor Advisory
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ Mailing List Release Notes
https://takeonme.org/cves/CVE-2023-4504.html Exploit
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7 Release Notes
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h Exploit Vendor Advisory
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6 Exploit Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/ Mailing List Release Notes
https://takeonme.org/cves/CVE-2023-4504.html Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openprinting:cups:*:*:*:*:*:*:*:*
cpe:2.3:a:openprinting:libppd:2.0:rc2:*:*:*:linux:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary (en) Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. (en) Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

Information

Published : 2023-09-21 23:15

Updated : 2025-04-23 17:16


NVD link : CVE-2023-4504

Mitre link : CVE-2023-4504

CVE.ORG link : CVE-2023-4504


JSON object : View

Products Affected

openprinting

  • cups
  • libppd

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write