[ om / jp / 2d ] [ home ]

/jp/ - 2D/Random

Name
Email
Subject
Comment
File
Password (For file deletion.)

File: 1727305610216.jpg (630.72 KB, 1476x2000, 1726770457293906.jpg)

No. 632639

Disable CUPS on all your systems, it's secret right now but they're about to drop a 9.9 CVE zero-click RCE on basically all Linux/BSD/macOS systems that have CUPS running with default config.

If you can't access http://localhost:631 you're safe

No.632640

im safe
but from who…

No.632641

spam

No.632643

what is he talking about whatmin

No.632646

File: 1727310069046.jpg (106.61 KB, 1280x720, mpv-11h30-00:00:50.951.jpg)

>>632643
It's undisclosed right now, it will be disclosed in 10 more days, you could almost say two more weeks.

No.632664

>>632646
yeah so where does the "it's cups" come from if it hasn't been disclosed yet
why is linux so bad and insecure like this whatmin?

No.632665

using modern windows is probably the equivalent of going down to the local police station and asking to use one of their computers to browse the net

No.632667

great place to commit the perfect crime

No.632668

Why would NEET own a printer anyway youre not filing TPS reports I am an incomparable homoOOO

No.632669

how else are you going to print out your kanji practice sheets

No.632674

File: 1727366216055.jpg (150.45 KB, 1024x971, 1726691505444522.jpg)

>>632668
I haven't had CUPS installed for years, but even when I did I only enabled it on the rare occasion when I actually wanted to print.

Back in the day (not that long ago), each individual printer had to have drivers made for it, you had to look up GutenPrint driver support list to see if your printer would work on Linux.

My mom recently wanted to buy a new printer, and wanted me to pick it out. I was surprised to find out that humanity has advanced so printers finally use a standardized generic protocol, and don't require individualized drivers. It was a moment where I really felt like "FUTUREEEEEE" - Squidward

>>632664
Trust me bro

No.632675

What if I have a windows computer with a printer plugged in i never use and I download fc2 ppv videos? Does that mean Trevor is going to hack me?

No.632676

File: 1727370063350.jpg (217.97 KB, 1200x1600, 514x1.jpg)

I remember how my usb ports didn't work on my computer for years and I didn't know why, only after I did a factory reset I think, it turned out the drivers were never installed or got uninstalled or corrupted some time or something. I even dragged the pc to the store once and they were like "yeah the power to the usb ports is down that's why it's not working well fix it for you for [amount of money i didn't have]"

No.632677

Oh, the usb ports are under that little flap in the front. There are also 4 on the back. Come to think of it, I don't remember if they all weren't working or if just the front ones weren't working.

No.632678

File: 1727370587164.jpg (490.42 KB, 874x1240, illust_120192141_20240925_….jpg)

That USB story is basically a reminder of how easy it is to forget about random stuff running on your system. Dude's USB ports didn't work for years and it was just drivers missing or broken. Same deal with CUPS—how many people even know it's running on their machine? Probably not a lot. It's just there by default, doing its thing until something goes wrong or some exploit drops like this supposed 9.9 CVE.

Not knowing what’s going on under the hood can lead to big problems, whether it’s a broken port or leaving yourself wide open to some zero-click RCE because you didn’t realize CUPS was running. Both show how complex and easy it is to overlook these systems. You think everything’s fine, but in reality, you’re sitting on a time bomb.

The guy had to drag his computer to a store to figure out it was just a driver problem—imagine how many people don’t even realize they’re at risk because of stuff like this. Just another reason to keep an eye on what's running in the background. Otherwise, you might end up getting pwned because you forgot you ever had CUPS installed.

No.642214

File: 1739309956647.jpg (226.1 KB, 583x710, 1739273228058.jpg)


No.642220

have cups installed but not enabled as daemon or service just incase i need to print

No.642221

have cups running on both my web facing webserver and my pc did anything ever come out of this whatmin

No.642222

actually i found it it was an actual vulnerability i thought op was just funposting and never bothered to look it up

>In simplified terms, CVE-2024-47176 lets attackers exploit the CUPS printing service by sending a specially crafted, unauthenticated packet to its UDP port


wow so it's fucking nothing, so you either need to expose the cups port to the internet or have an attacker have access to your local network

No.642225

File: 1739315414423.jpg (56.01 KB, 640x334, 98705707_p0.jpg)

>>642221
Yes they announced the exploit the next day or so.

It really was a zero-click RCE just from having CUPS running, but it would only trigger the next time someone tries to print (to what appears to be their normal printer).

Yes that's zero-click in the same way that if opening a PDF automatically triggered an exploit you would call that "zero click", despite you clicking on the PDF.

People were downplaying it cause "lol who has CUPS web interface exposed to the internet", and "lol I don't print".

Some people actually do, and also any device being able to pwn you on your LAN is also really bad.

No.642227

>>642222
Yes and I correctly predicted it before it was ever announced, they originally weren't going to make it public for weeks.

The reporter was kind of blabbing his mouth about how it effects macOS, BSD, macOS, and other systems.

Then I saw the assigned companies to it, including Apple and HP.

Thought for a second and realized it must be CUPS.

No.642230

>>642227
uhh the site says the the nvd was published on the same day you made the thread

>and also any device being able to pwn you on your LAN is also really bad

it's literally "physical access" tier "vulnerability" for 99% of users

No.642231

>>642230
When I made this thread it was 100% undisclosed, and it wasn't planned to be disclosed for weeks. People in tech circles were trying to guess what it was for several days.

They made it public the next day because the reporter was blabbing his mouth too much and it became more obvious it was CUPS.

No.642232

https://it.slashdot.org/story/24/09/25/2150210/critical-unauthenticated-rce-flaw-impacts-all-gnulinux-systems

Proof: Slashdot thread with posts from September 25/early 26th talking about it as still a mystery.

No.642233

Does ota connect to the home wifi

No.642234

>>642232
i already believed you whatmin but now that you posted this i noticed that everyone was talking it was cups to begin with sigh i thought you were like the only one who realized it on your own using your hacker skills you honed running a jp spinoff

No.642235

dont forget that turbolinux was laundering microsoft patches into the kernel

No.642246

phew for a second I thought my android phone was vulnerable



Delete Post [ ]
[Return]
[ om / jp / 2d ] [ home ]