CUPS HTTP Host Header DNS Rebinding Attacks

Summary
This host is running CUPS, and is prone to DNS Rebinding Attacks.
Impact
An attacker can use this weakness to carry out certain attacks such as DNS rebinding against the vulnerable server. Impact Level: Application
Solution
Upgrade to version 1.3.10 or latest http://www.cups.org/software.php
Insight
The flaw is cause due to insufficient validation of the HTTP Host header in a client request.
Affected
CUPS version prior to 1.3.10
References