42
submitted 3 weeks ago by Toes@ani.social to c/linux@programming.dev
you are viewing a single comment's thread
view the rest of the comments
[-] mox@lemmy.sdf.org 2 points 3 weeks ago* (last edited 3 weeks ago)

Either of these commands will reveal processes listening on the port that's vulnerable by default:

$ sudo lsof -i :631
$ sudo fuser -v 631/tcp 631/udp

The wording of this post gives me the impression that it could exploited even if you don't have any such processes, if your system contacts a malicious or compromised print server. I would avoid browsing or using printers on unsafe networks until this is patched.

The port 631 process just makes it worse, by allowing someone else to initiate that contact remotely.

this post was submitted on 27 Sep 2024
42 points (100.0% liked)

Linux

5129 readers
158 users here now

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 1 year ago
MODERATORS