Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 07 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 05 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_els:7 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
Sat, 05 Oct 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 04 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cups
Cups cups |
|
| Weaknesses | CWE-400 | |
| CPEs | cpe:2.3:a:cups:cups:1.0:-:*:*:*:*:*:* | |
| Vendors & Products |
Cups
Cups cups |
|
| Metrics |
cvssV3_1
|
Fri, 04 Oct 2024 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.) | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-11T22:03:17.443Z
Reserved: 2024-10-04T00:00:00.000Z
Link: CVE-2024-47850
Updated: 2024-10-11T22:03:17.443Z
Status : Deferred
Published: 2024-10-04T05:15:11.243
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-47850
OpenCVE Enrichment
No data.