USN-3577-1: CUPS vulnerability
21 February 2018
CUPS could be made to provide access to printers over the network.
Releases
Packages
- cups - Common UNIX Printing System(tm)
Details
Jann Horn discovered that CUPS permitted HTTP requests with the Host
header set to "localhost.localdomain" from the loopback interface. If a
user were tricked in to opening a specially crafted website in their web
browser, an attacker could potentially exploit this to obtain sensitive
information or control printers, via a DNS rebinding attack.
(CVE-2017-18190)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.