Your submission was sent successfully! Close

USN-3577-1: CUPS vulnerability

21 February 2018

CUPS could be made to provide access to printers over the network.



  • cups - Common UNIX Printing System(tm)


Jann Horn discovered that CUPS permitted HTTP requests with the Host
header set to "localhost.localdomain" from the loopback interface. If a
user were tricked in to opening a specially crafted website in their web
browser, an attacker could potentially exploit this to obtain sensitive
information or control printers, via a DNS rebinding attack.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04
Ubuntu 14.04

In general, a standard system update will make all the necessary changes.