Command injection in cups (Alpine package)



Published: 2018-02-27
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-18190
CWE-ID CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
cups (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Command injection

EUVDB-ID: #VU10942

Risk: Low

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-18190

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The weakness exists in a localhost.localdomain whitelist entry in valid_host() in scheduler/client.c due to the localhost.localdomain name is often resolved via a DNS server. A remote attacker can send specially crafted POST requests to the CUPS daemon in conjunction with DNS rebinding, inject and execute arbitrary IPP commands.

Mitigation

Install update from vendor's website.

Vulnerable software versions

cups (Alpine package): 1.4.6-r0 - 2.1.3-r1

External links

http://git.alpinelinux.org/aports/commit/?id=6f8b1660f4ded00badb22ec640c6f86c6a0476e9
http://git.alpinelinux.org/aports/commit/?id=04355388bc6f02f982a74c12a162fca6dff77b1b
http://git.alpinelinux.org/aports/commit/?id=b57ce380deaa352d151f152d98f92e45da3a2a70


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###