EulerOS Virtualization 2.5.0 : cups (EulerOS-SA-2018-1329)

Medium Nessus Plugin ID 118417


The remote EulerOS Virtualization host is missing multiple security


According to the versions of the cups package installed, the EulerOS
Virtualization installation on the remote host is affected by the
following vulnerabilities :

- CUPS printing system provides a portable printing layer
for UNIX(r) operating systems. It has been developed by
Apple promote a standard printing solution for
all UNIX vendors and users.CUPS provides the System V
and Berkeley command-line interfaces.

- Security fix(es):

- A localhost.localdomain whitelist entry in valid_host()
in scheduler/client.c in CUPS before 2.2.2 allows
remote attackers to execute arbitrary IPP commands by
sending POST requests to the CUPS daemon in conjunction
with DNS rebinding. The localhost.localdomain name is
often resolved via a DNS server (neither the OS nor the
web browser is responsible for ensuring that
localhost.localdomain is

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.


Update the affected cups packages.

See Also

Plugin Details

Severity: Medium

ID: 118417

File Name: EulerOS_SA-2018-1329.nasl

Version: 1.2

Type: local

Published: 2018/10/26

Modified: 2018/11/13

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:cups-libs, cpe:/o:huawei:euleros:uvp:2.5.0

Patch Publication Date: 2018/09/26

Reference Information

CVE: CVE-2017-18190