CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 | Not Applicable | 
| https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 | Not Applicable | 
| https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 | Exploit Vendor Advisory | 
| https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 | Not Applicable | 
| https://www.cups.org | Product | 
| https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I | Exploit Third Party Advisory | 
| https://github.com/OpenPrinting/libcupsfilters/commit/95576ec3d20c109332d14672a807353cdc551018 | Patch | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    29 Sep 2025, 13:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 - Not Applicable | |
| References | () https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 - Not Applicable | |
| References | () https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 - Exploit, Vendor Advisory | |
| References | () https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 - Not Applicable | |
| References | () https://www.cups.org - Product | |
| References | () https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I - Exploit, Third Party Advisory | |
| References | () https://github.com/OpenPrinting/libcupsfilters/commit/95576ec3d20c109332d14672a807353cdc551018 - Patch | |
| First Time | Openprinting libcupsfilters Openprinting | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:* cpe:2.3:a:openprinting:libcupsfilters:2.1:beta1:*:*:*:*:*:* | 
Information
                Published : 2024-09-26 22:15
Updated : 2025-09-29 13:26
NVD link : CVE-2024-47076
Mitre link : CVE-2024-47076
CVE.ORG link : CVE-2024-47076
JSON object : View
Products Affected
                openprinting
- libcupsfilters
CWE
                