Jump in the discussion.

No email address required.

To exploit this across the internet or LAN, a miscreant needs to reach your CUPS service on UDP port 631. Hopefully none of you have that facing the public internet. The miscreant also has to wait for you to start a print job.

Lmao, super serious vulnerability guys.

Jump in the discussion.

No email address required.

I've discovered a more serious vulnerability where if you expose a CUPS server to the internet I can print a ton of cyan, magenta and black pages to waste your ink

Jump in the discussion.

No email address required.

:marseyscream: !besties watch yourselves, it's getting dangerous around here

Jump in the discussion.

No email address required.

https://media.tenor.com/EACgCTxbQscAAAAx/jesse-pinkman-cry.webp

Jump in the discussion.

No email address required.

Literally a 1/10, who the frick gave this a 9.9?

The miscreant also has to wait for you to start a print job.

That is literally user interaction! It can't be a 9.9!

Jump in the discussion.

No email address required.

It isn't interaction with the attacker tho.

Jump in the discussion.

No email address required.

Yes it is? They have to print to your fake printer?

Jump in the discussion.

No email address required.

Reading the article it sounded like any print job would trigger the race. Reading the full write up that's not the case. And the loser who found it talks about "gaslamping attempts ". What a strag

Jump in the discussion.

No email address required.

Cop out

Jump in the discussion.

No email address required.

Perfectly safe

Until your foid's thermomix gets backdoored

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.