Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-18190

Опубликовано: 16 фев. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

РелизСтатусПримечание
artful

not-affected

2.2.4-7ubuntu2
devel

not-affected

2.2.6-5
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.7.2-0ubuntu1.9]]
esm-infra/xenial

released

2.1.3-4ubuntu0.4
precise/esm

DNE

trusty

released

1.7.2-0ubuntu1.9
trusty/esm

DNE

trusty was released [1.7.2-0ubuntu1.9]
upstream

released

2.2.2
xenial

released

2.1.3-4ubuntu0.4

Показывать по

EPSS

Процентиль: 72%
0.007
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.8
redhat
почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
nvd
почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

CVSS3: 7.5
debian
почти 8 лет назад

A localhost.localdomain whitelist entry in valid_host() in scheduler/c ...

suse-cvrf
почти 8 лет назад

Security update for cups

suse-cvrf
почти 8 лет назад

Security update for cups

EPSS

Процентиль: 72%
0.007
Низкий

5 Medium

CVSS2

7.5 High

CVSS3