{"id":"MGASA-2018-0147","summary":"Updated cups packages fix security vulnerability","details":"Updated cups packages fix security vulnerability:\n\nJann Horn discovered that CUPS permitted HTTP requests with the Host header set\nto \"localhost.localdomain\" from the loopback interface. If a user were tricked\nin to opening a specially crafted website in their web browser, an attacker\ncould potentially exploit this to obtain sensitive information or control\nprinters, via a DNS rebinding attack (CVE-2017-18190).\n","modified":"2026-04-16T04:41:20.998788371Z","published":"2018-02-26T23:40:56Z","upstream":["CVE-2017-18190"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0147.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22649"},{"type":"WEB","url":"https://usn.ubuntu.com/usn/usn-3577-1/"}],"affected":[{"package":{"name":"cups","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/cups?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.4-1.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0147.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}