Reflecting on the CUPS CVEs

  Рет қаралды 374

hexdump

hexdump

Күн бұрын

Пікірлер: 6
@hexdump1337
@hexdump1337 3 ай бұрын
it is important to realize that while the chain described within the article can be described as "RCE through printing". This means, when a printing event is initiated on the malicious printer, the malicious command is executed. The question on whether this requires user interaction or not depends mainly on the environment under analysis. If the environment has no extra configuration, then it does require user interaction. If however the environment has other services that allow to print by sending specific requests to specific ports, then there are ways to achieve RCE even without user interaction. This is to say that it's hard to describe all the possible risk scenarios without understanding every single possible environment, and also what are the most probably environments in, for example, home LANs or in corporate LANs and so forth. Ultimately, the takeway is: disable CUPS if you do not need to print stuff, and if you need to print stuff, be careful on how your instance is configured, and do not accept connection from arbitrary IPs.
@ДмитрийКузнецов-я4д
@ДмитрийКузнецов-я4д 3 ай бұрын
The best explanations about this CVE i ve seen , thanks a million
@behindYOUR6
@behindYOUR6 3 ай бұрын
Thanks for talking about this
@pradeepkumarsharma8789
@pradeepkumarsharma8789 3 ай бұрын
Thanks a lot
@pohjoisenvanhus
@pohjoisenvanhus 3 ай бұрын
Hunting for vulnerabilities is somewhat of a business nowadays so it just makes sense for people for whom money and fame is an incentive to exaggerate the issues, isn't it? But as someone who's a bit new to reading CVSS scores I'm a tiny bit surprised that RedHat's portal doesn't include a breakdown of the score that would include the reasoning behind the component scores.
@hexdump1337
@hexdump1337 3 ай бұрын
In security it actually happens many times, definitely more times than it should, to not include much information behind CVEs or CVSS scores like these. Indeed, both CVEs and CVSS can be extremely useful but also extremely useless, depending on how they are used. I’ll come back to these themes in the channel for sure. With respect to the “exaggeration” part, I’d say it’s a very interesting and potentially useful attack vector in red teaming scenarios involving corporate networks. People probably would not have picked this up if it weren’t for the “hype”.
Weak Service Permissions
23:27
hexdump
Рет қаралды 639
I'VE MADE A CUTE FLYING LOLLIPOP FOR MY KID #SHORTS
0:48
A Plus School
Рет қаралды 20 МЛН
Война Семей - ВСЕ СЕРИИ, 1 сезон (серии 1-20)
7:40:31
Семейные Сериалы
Рет қаралды 1,6 МЛН
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 54 М.
I’ve Never Been This ANGRY and CONFUSED - AMD 2025 Product Update (CES)
12:14
Job losses at Europe’s car parts suppliers skyrocket as European crisis grows
13:24
Are You Anxious About OSCP?
20:24
hexdump
Рет қаралды 604
I Wrote HTTP "From Scratch" (It Was Easy)
19:07
Sean Bix
Рет қаралды 89 М.
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor
48:29
Embedded Rust setup explained
23:03
The Rusty Bits
Рет қаралды 96 М.
I'VE MADE A CUTE FLYING LOLLIPOP FOR MY KID #SHORTS
0:48
A Plus School
Рет қаралды 20 МЛН