{"id":5320,"date":"2024-09-26T12:24:37","date_gmt":"2024-09-26T10:24:37","guid":{"rendered":"https:\/\/www.lrob.fr\/?p=5320"},"modified":"2024-09-30T08:47:52","modified_gmt":"2024-09-30T06:47:52","slug":"critical-security-flaw-in-gnu-linux-september-october-2024-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.lrob.fr\/en\/blog\/securite\/faille-de-securite-critique-dans-gnu-linux-septembre-octobre-2024-ce-que-vous-devez-savoir\/","title":{"rendered":"Critical security flaw in CUPS on GNU\/Linux September-October 2024: What you need to know"},"content":{"rendered":"<p>A quadruple critical security flaw has just been discovered in CUPS for all GNU\/Linux systems. This article will be updated with the new information, to provide you with a simple and effective summary of what you need to know and do.<\/p>\n\n\n\n<p><em>UPDATE 09\/29\/2024: These flaws only concern CUPS, so very few servers are affected, unless you have printers in your datacenter...! This article has been rewritten accordingly.<\/em> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A critical flaw: what do we know?<\/h2>\n\n\n\n<p>The security researcher <strong>Simone Margaritelli<\/strong>discovered this set of faults in early September.<\/p>\n\n\n\n<p>This concerns CUPS, the Linux printing service. The researcher highlights a possible Remote Code Execution (RCE). <strong>without authentication<\/strong>. This means that attackers could potentially execute commands on remote machines without having to identify themselves, making the flaw particularly dangerous. The CVSS score assigned to these vulnerabilities is between <strong>8.3 and 9.0\/10<\/strong> (after being rated at 9.9).<\/p>\n\n\n\n<p>On September 26, Na\u00efm Aouaichia, cybersecurity engineer, alerted us and told us before anyone else that this could affect CUPS :<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-default is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-medium-font-size\">\"Some rumors suggest that this flaw is linked to vulnerabilities in CUPS, the printing service. Yes, your printers may be at the heart of it all. To be confirmed.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">According to some hypotheses, the problem could be linked to a buffer overflow or a race condition.\"<\/p>\n<cite><a href=\"https:\/\/www.linkedin.com\/posts\/naim-aouaichia-cyber-security-engineer_si-vous-%C3%AAtes-sous-linux-pr%C3%A9parez-vous-%C3%A0-activity-7244948812257976320-W0oy\" rel=\"nofollow noopener\" target=\"_blank\">Extract from the LinkedIn post of Na\u00efm Aouaichia, cybersecurity engineer<\/a><\/cite><\/blockquote>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-86dba5ee wp-block-group-is-layout-constrained\" style=\"border-width:1px;padding-top:var(--wp--preset--spacing--10);padding-right:var(--wp--preset--spacing--10);padding-bottom:var(--wp--preset--spacing--10);padding-left:var(--wp--preset--spacing--10)\">\n<p><strong>Update 29\/09\/2024<\/strong><\/p>\n\n\n\n<p>Like <a href=\"https:\/\/www.linkedin.com\/posts\/naim-aouaichia-cyber-security-engineer_jai-parl%C3%A9-de-la-vuln%C3%A9rabilit%C3%A9-sur-linux-activity-7245673591940296704-kucO\" target=\"_blank\" rel=\"noreferrer noopener\">Na\u00efm winds it up on September 28<\/a>This flaw concerns CUPS, with 4 CVEs revealed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47176\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-47176<\/a> (cups-browed)<\/li>\n\n\n\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47076\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-47076<\/a> (cups-filters)<\/li>\n\n\n\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47175\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-47175<\/a> (libppd)<\/li>\n\n\n\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47177\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-47177<\/a> (cups-filters)<\/li>\n<\/ul>\n\n\n\n<p>This does not apply to dedicated servers under firewall and\/or with a print service not running.<br>For local administrators using CUPS, stay tuned.<\/p>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">A long-standing problem<\/h3>\n\n\n\n<p>This vulnerability has a long history, having been present in GNU\/Linux systems for many years. <strong>over a decade<\/strong>. It affects <strong>all<\/strong> Linux distributions, including Debian, Ubuntu, RedHat and others.<\/p>\n\n\n\n<p>Despite the importance of this flaw, there are currently no <strong>no correction<\/strong> available. Developers are still debating which aspects of the flaw really affect security, which is delaying the release of a patch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disclosure process<\/h2>\n\n\n\n<p>Researcher Margaritelli, who made the discovery, worked tirelessly for three weeks to alert the open source community and help coordinate patching efforts. However, <a href=\"https:\/\/threadreaderapp.com\/thread\/1838169889330135132.html\" target=\"_blank\" rel=\"noreferrer noopener\">it met with a great deal of resistance from developers<\/a>Some are reluctant to accept the existence of this flaw in their code. This underlines the challenges facing vulnerability management in the open source world.<\/p>\n\n\n\n<p>Some accuse him of trying to boost his popularity. But let's face it: the researcher has indeed discovered a major flaw that everyone has been ignoring for over 10 years.<\/p>\n\n\n\n<p><strong>Canonical (Ubuntu)<\/strong> and <strong>RedHat<\/strong> have confirmed the seriousness of the situation and are actively working on a solution. Full disclosure of the technical details of the flaw is planned. <strong>October 6<\/strong>This increases the pressure for a rapid patch release.<\/p>\n\n\n\n<p>The roadmap is as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>September 30: Initial disclosure to the Openwall security mailing list<\/li>\n\n\n\n<li>October 6: Public revelation with all the elements of vulnerability<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Why is it complicated to correct the flaw?<\/h2>\n\n\n\n<p>Margaritelli indicated from the outset that it would probably be necessary to <strong>at least three to six CVE identifiers<\/strong> (Common Vulnerabilities and Exposures) to cover all aspects of the problem. This means that there are several potential attack vectors, each requiring specific analysis and resolution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the risks for you?<\/h2>\n\n\n\n<p><strong>As we now know, you must absolutely avoid exposing your IPP services to the Internet (port 631 should be blocked on firewalls).<\/strong><\/p>\n\n\n\n<p>Although this flaw is critical, it <strong>is not so easily exploited<\/strong>. It requires a high level of technical expertise, which means that, for the time being, only highly skilled attackers could make use of it. The details of the flaw are not yet public, limiting its impact. But this should not make you complacent. You need to remain vigilant, because once full disclosure has been made, exploitation attempts will multiply.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to do in the meantime?<\/h2>\n\n\n\n<p>Pending an official patch, here are some best practices to limit the risks:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Watch for official announcements<\/strong> Stay informed about security updates released by your Linux distribution. These announcements will let you know when a patch is available.<\/li>\n\n\n\n<li><strong>Reinforce your firewall configuration<\/strong> Make sure your servers are not unnecessarily exposed to the Internet. Restrict access to essential ports and, above all, do not expose port 631!<\/li>\n\n\n\n<li><strong>Limit service exposure<\/strong> Reduce the number of services listening publicly to a minimum by switching off unnecessary services or having them listen on 127.0.0.1.<\/li>\n\n\n\n<li><strong>Get ready for rapid deployment<\/strong> As soon as a patch is released, be ready to install it immediately to protect your machines.<\/li>\n\n\n\n<li><strong>Re-evaluate your backups<\/strong> : Make sure you have a good outsourced backup (LRob already has one, but it's not enough!). <a href=\"https:\/\/www.lrob.fr\/en\/blog\/tutorial-for-backing-up-plesk-hosting-on-your-home-nas\/\">we encourage everyone to have their own back-up<\/a>).<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: remain vigilant but serene<\/h2>\n\n\n\n<p>This RCE flaw is undoubtedly one of the most serious to be discovered in the GNU\/Linux ecosystem in a long time. However, it's important not to panic. No system is free of flaws, and Linux remains the most reliable and secure operating system. It's worth remembering that most servers don't have a CUPS service running, but if they do, then take extra care. By adopting the recommended security measures and keeping an eye on official announcements, you can minimize the risks. The open source world is generally quick to react and will certainly be able to overcome this ordeal effectively, despite the internal divergences inherent in collaborative work.<\/p>\n\n\n\n<p>Keep an eye on upcoming patches and make sure your systems are ready for them. IT security is an ongoing challenge, but staying proactive will ensure that your WordPress servers and clients stay protected.<\/p>\n\n\n\n<p>LRob is keeping a very close eye on this, and if the servers aren't affected, I guarantee that we'll fix this global flaw as soon as the patch is available.<\/p>\n\n\n\n<p>Finally, for those who will argue that \"Linux isn't secure\", here's a little comparison <a href=\"https:\/\/www.cvedetails.com\/cvss-score-charts.php?vendor=Linux&amp;vendor_id=33&amp;fromform=1\" target=\"_blank\" rel=\"noopener\">Linux<\/a> VS <a href=\"https:\/\/www.cvedetails.com\/cvss-score-charts.php?vendor=Microsoft&amp;vendor_id=26&amp;fromform=1\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d7c8b6306c4&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d7c8b6306c4\" class=\"wp-block-image alignwide size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2051\" height=\"541\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux.png\" alt=\"\" class=\"wp-image-5332\" srcset=\"https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux.png 2051w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-150x40.png 150w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-300x79.png 300w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-1024x270.png 1024w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-1536x405.png 1536w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-2048x540.png 2048w\" sizes=\"auto, (max-width: 2051px) 100vw, 2051px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">1-year comparison of Linux VS Microsoft security vulnerabilities<\/figcaption><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d7c8b63093f&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d7c8b63093f\" class=\"wp-block-image alignwide size-full wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"2060\" height=\"548\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans.png\" alt=\"\" class=\"wp-image-5335\" srcset=\"https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans.png 2060w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans-150x40.png 150w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans-300x80.png 300w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans-1024x272.png 1024w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans-1536x409.png 1536w, https:\/\/www.lrob.fr\/wp-content\/uploads\/2024\/09\/cvvs-report-windows-vs-linux-sur-11-ans-2048x545.png 2048w\" sizes=\"auto, (max-width: 2060px) 100vw, 2060px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">11-year comparison of Linux VS Microsoft security vulnerabilities<\/figcaption><\/figure>\n\n\n\n<p>The truth is: there's no such thing as 100% safety, and anyone who claims otherwise is either lying or ignorant! So leave dogmatism aside. No one is spared from vulnerabilities, so it's a question of doing our best and remaining vigilant to make intrusions as difficult as possible.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Sources :<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.linkedin.com\/posts\/naim-aouaichia-cyber-security-engineer_si-vous-%C3%AAtes-sous-linux-pr%C3%A9parez-vous-%C3%A0-activity-7244948812257976320-W0oy\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn post by Na\u00efm Aouaichia, cybersecurity engineer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/threadreaderapp.com\/thread\/1838169889330135132.html\" target=\"_blank\" rel=\"noreferrer noopener\">Thread by Simone Margaritelli on X<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/korben.info\/faille-rce-critique-linux-cauchemar-admins.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article on Korben<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/securityonline.info\/severe-unauthenticated-rce-flaw-cvss-9-9-in-gnu-linux-systems-awaiting-full-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Article on securityonline.info<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Une quadruple faille de s\u00e9curit\u00e9 critique vient d\u2019\u00eatre d\u00e9couverte dans CUPS pour l\u2019ensemble des syst\u00e8mes GNU\/Linux. Cet article sera mis \u00e0 jour avec les nouvelles informations, pour vous offrir un r\u00e9sum\u00e9 simple et efficace de ce qu\u2019il faut savoir et des mesures \u00e0 prendre. MAJ 29\/09\/2024 : Ces failles concernent bien uniquement CUPS, donc tr\u00e8s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5321,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28,5,4],"tags":[],"class_list":["post-5320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-blog","category-news"],"_links":{"self":[{"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/posts\/5320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/comments?post=5320"}],"version-history":[{"count":12,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/posts\/5320\/revisions"}],"predecessor-version":[{"id":5342,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/posts\/5320\/revisions\/5342"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/media\/5321"}],"wp:attachment":[{"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/media?parent=5320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/categories?post=5320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lrob.fr\/en\/wp-json\/wp\/v2\/tags?post=5320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}