Tuesday, February 20, 2018

[USN-3577-1] CUPS vulnerability

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJajLpiAAoJEGEfvezVlG4PulcH/2sizSCUMc5BLxANWcrw4kqT
NjJ3/XIpTr4uqdIyaQJrfo9ULXuG2RmCKBwE8PVaSb2u/umEnjPuNFzkHns84ei2
10cn4hoVkIDBmCEzpS4mbiKOGuezY8DTPuUqBmooTzHLBM5f7VrRd+9gyGm/Y4O/
fQQHUr7HAQGcEWbWfSj8R31Mh7Q9kS25g6CaNmUExSFV3xzuXzaP+ZKLndcZf7oW
gm63+uEQ9fjfnvrIGYCuiuB+mk3dS34tkOZO4v3gLkNPmU+sWHggKO3JNQZVRd4q
NBB8uN/ElWliQ9W8fzTCw5L9rmX5dlCdo1rADR//eGPeT+x6PxB8P5ShkRTtFms=
=rsSE
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3577-1
February 21, 2018

cups vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

CUPS could be made to provide access to printers over the network.

Software Description:
- cups: Common UNIX Printing System(tm)

Details:

Jann Horn discovered that CUPS permitted HTTP requests with the Host
header set to "localhost.localdomain" from the loopback interface. If a
user were tricked in to opening a specially crafted website in their web
browser, an attacker could potentially exploit this to obtain sensitive
information or control printers, via a DNS rebinding attack.
(CVE-2017-18190)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
cups 2.1.3-4ubuntu0.4

Ubuntu 14.04 LTS:
cups 1.7.2-0ubuntu1.9

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3577-1
CVE-2017-18190

Package Information:
https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.4
https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.9

No comments:

Post a Comment