[Bug 106245] Re: [feisty] web vulnerability

2007-05-16 Thread Kees Cook
Yes, this is a design flaw in how CUPS handles its URLs. As described, I think this is a only a minor issue, since the printer name must be known, and no attacker-input is used (it prints the pre-configured test page, and not text that the attacker can control). However, further investigation

[Bug 106245] Re: [feisty] web vulnerability

2007-04-16 Thread Martin Pitt
Please elaborate about this. By default, cupsd only listens on localhost. Local users can do printing operations much easier. On top of that, administrative operations are restricted to localhost: # Restrict access to the admin pages... Location /admin Order allow,deny Allow

Re: [Bug 106245] Re: [feisty] web vulnerability

2007-04-16 Thread Amnon Aaronsohn
On 4/16/07, Martin Pitt [EMAIL PROTECTED] wrote: Please elaborate about this. By default, cupsd only listens on localhost. Local users can do printing operations much easier. cupsd listens on localhost but remote web pages can make the browser access it, , as in the example above. Note that the

[Bug 106245] Re: [feisty] web vulnerability

2007-04-13 Thread Brian Murray
Thanks for taking the time to report this bug and helping to make Ubuntu better. With which version of cupsys and Ubuntu did you notice this? Thanks in advance. ** Changed in: cupsys (Ubuntu) Assignee: (unassigned) = Brian Murray Status: Unconfirmed = Needs Info -- [feisty] web

Re: [Bug 106245] Re: [feisty] web vulnerability

2007-04-13 Thread Amnon Aaronsohn
On 4/13/07, Brian Murray [EMAIL PROTECTED] wrote: With which version of cupsys and Ubuntu did you notice this? ubuntu feisty (as the subject line says...), cupsys version 1.2.8-0ubuntu8. Amnon -- [feisty] web vulnerability https://bugs.launchpad.net/bugs/106245 You received this bug