MGASA-2018-0147

Source
https://advisories.mageia.org/MGASA-2018-0147.html
Import Source
https://advisories.mageia.org/MGASA-2018-0147.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0147
Related
Published
2018-02-26T23:40:56Z
Modified
2018-02-26T23:10:09Z
Summary
Updated cups packages fix security vulnerability
Details

Updated cups packages fix security vulnerability:

Jann Horn discovered that CUPS permitted HTTP requests with the Host header set to "localhost.localdomain" from the loopback interface. If a user were tricked in to opening a specially crafted website in their web browser, an attacker could potentially exploit this to obtain sensitive information or control printers, via a DNS rebinding attack (CVE-2017-18190).

References
Credits

Affected packages

Mageia:5 / cups

Package

Name
cups
Purl
pkg:rpm/mageia/cups?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.4-1.4.mga5

Ecosystem specific

{
    "section": "core"
}