ALPINE-CVE-2017-18190

Source
https://security.alpinelinux.org/vuln/CVE-2017-18190
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2017-18190.json
JSON Data
https://api.test.osv.dev/v1/vulns/ALPINE-CVE-2017-18190
Upstream
Published
2018-02-16T17:29:00Z
Modified
2025-09-25T23:55:30.331909Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

References

Affected packages

Alpine:v3.5 / cups

Package

Name
cups
Purl
pkg:apk/alpine/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.2-r0

Affected versions

1.*

1.4.1-r0
1.4.2-r0
1.4.2-r1
1.4.2-r2
1.4.3-r0
1.4.3-r1
1.4.3-r2
1.4.3-r3
1.4.4-r0
1.4.4-r1
1.4.5-r0
1.4.6-r0
1.4.7-r0
1.4.8-r0
1.5.0-r0
1.5.0-r1
1.5.0-r2
1.5.2-r0
1.5.2-r1
1.5.2-r2
1.5.2-r3
1.5.3-r0
1.5.4-r0
1.5.4-r1
1.6.1-r0
1.6.1-r1
1.6.2-r0
1.6.2-r1
1.6.3-r0
1.6.4-r0
1.7.0-r0
1.7.0-r1
1.7.1-r0
1.7.2-r0
1.7.3-r0
1.7.3-r1
1.7.4-r0
1.7.5-r0

2.*

2.0.0-r0
2.0.1-r0
2.0.2-r0
2.0.2-r1
2.0.2-r2
2.0.3-r0
2.0.4-r0
2.1.0-r0
2.1.1-r0
2.1.2-r0
2.1.3-r0
2.1.3-r1
2.1.4-r0
2.2.1-r0
2.2.1-r1