← Back to CVEs
CVE-2017-18190
N/ADescription
A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
CVE Details
CVSS v3.1 ScoreN/A
Published2/16/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
apple:cupscanonical:ubuntu_linuxdebian:debian_linux
Weaknesses (CWE)
CWE-290
References
https://usn.ubuntu.com/3577-1/(cve@mitre.org)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1048(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/apple/cups/commit/afa80cb2b457bf8d64f775bed307588610476c41(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/02/msg00023.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3577-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.