Severity
6.7MEDIUMNVD
CNA4.4
EPSS
3.1%
top 13.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateJun 24

Description

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Giv

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5openprinting/cups2.4.8
Debianapple/cups< 2.3.3op2-3+deb11u7+3

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-35235: OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems2024-06-11
CVEList
Cupsd Listen arbitrary chmod 01407772024-06-11

📋Vendor Advisories

4
Ubuntu
CUPS vulnerability2024-06-24
Microsoft
Cupsd Listen arbitrary chmod 01407772024-06-11
Red Hat
cups: Cupsd Listen arbitrary chmod 01407772024-06-11
Debian
CVE-2024-35235: cups - OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...2024
CVE-2024-35235 — Link Following in Openprinting Cups | cvebase