Summary
This host is running CUPS, and is prone to DNS Rebinding Attacks.
Impact
An attacker can use this weakness to carry out certain attacks such as DNS rebinding against the vulnerable server.
Impact Level: Application
Solution
Upgrade to version 1.3.10 or latest
http://www.cups.org/software.php
Insight
The flaw is cause due to insufficient validation of the HTTP Host header in a client request.
Affected
CUPS version prior to 1.3.10
References
Severity
Classification
-
CVE CVE-2009-0164 -
CVSS Base Score: 6.4
AV:N/AC:L/Au:N/C:N/I:P/A:P
Related Vulnerabilities
- Apple Safari JavaScript Implementation Information Disclosure Vulnerability (Windows)
- Adobe Reader Privelege Escalation Vulnerability - Jul07 (Mac OS X)
- Apple Safari Webkit Multiple Vulnerabilities - May13 (Mac OS X)
- Apple Safari 'SRC' Remote Denial Of Service Vulnerability
- Apache /server-status accessible