Attacking UNIX Systems via CUPS, Part I | CUPS Remote Code Execution

Leaflet@lemmy.world to Linux@lemmy.ml – 159 points –
Attacking UNIX Systems via CUPS, Part I
evilsocket.net
34

You are viewing a single comment

Entirely personal recommendation, take it or leave it: I’ve seen and attacked enough of this codebase to remove any CUPS service, binary and library from any of my systems and never again use a UNIX system to print. I’m also removing every zeroconf / avahi / bonjour listener. You might consider doing the same.

Great advice. It would appear these developers don’t take security seriously.

Mdns is something most people have no idea exists.

Oh, neat, all my devices broadcast all their open ports, services, addresses, hardware and names? Cool!

No.

If your router/firewall is configured to let these broadcasts through you have a problem. If it is working correctly and you have an attacker on your lan? You have already lost.

It depends. If you're using a laptop and say you take it to university or work then you're not on your LAN. You're on someone else's LAN and they may have no interest in trying to stop these types of attacks via any kind of client isolation or it may be incomplete.

I can imagine it's a very normal scenario for university students to have CUPS running and available on all networks as they may need to print at their university.

You've just described every enterprise who allows Linux in their environment.

Someone doesn't like apple

Nobody likes Apple. They're just afraid to say they don't.

They're standardised zeroconnf protocols. Apple was part of the early development.

Bonjour is the apple implementation for mDNS.

Avahi is the GPL compliant implementation.

mDNS, llmnr (ms developed), have been known for ages to be vulnerable.

https://en.m.wikipedia.org/wiki/Zero-configuration_networking#Standardization

*I don't like apple