{"vulnerability": "CVE-2023-32324", "sightings": [{"uuid": "43acb2bb-9e87-49e6-9ad4-5f985d3bcb47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32324", "type": "seen", "source": "https://t.me/arpsyndicate/1581", "content": "#ExploitObserverAlert\n\nCVE-2023-32324\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-32324. OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.\n\nFIRST-EPSS: 0.000680000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-10T00:01:36.000000Z"}]}