The web interface for CUPS before 1.3.10 does not validate the HTTP Host header in a client request, which makes it easier for remote attackers to conduct DNS rebinding attacks.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=490597 | patch |
http://security.gentoo.org/glsa/glsa-200904-20.xml | vendor advisory |
http://www.cups.org/str.php?L3118 | patch vendor advisory |
http://www.cups.org/articles.php?L582 | patch vendor advisory |
http://support.apple.com/kb/HT3549 | |
http://wiki.rpath.com/Advisories:rPSA-2009-0061 | |
http://secunia.com/advisories/35074 | third party advisory |
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | vendor advisory |
http://www.securityfocus.com/archive/1/502750/100/0/threaded | mailing list |
http://www.us-cert.gov/cas/techalerts/TA09-133A.html | third party advisory us government resource |
http://bugs.gentoo.org/show_bug.cgi?id=263070 | |
http://www.vupen.com/english/advisories/2009/1297 | vdb entry |
http://www.securityfocus.com/bid/34665 | vdb entry |