Your submission was sent successfully! Close

USN-3577-1: CUPS vulnerability

21 February 2018

CUPS could be made to provide access to printers over the network.

Releases

Packages

  • cups - Common UNIX Printing System(tm)

Details

Jann Horn discovered that CUPS permitted HTTP requests with the Host
header set to "localhost.localdomain" from the loopback interface. If a
user were tricked in to opening a specially crafted website in their web
browser, an attacker could potentially exploit this to obtain sensitive
information or control printers, via a DNS rebinding attack.
(CVE-2017-18190)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.

References