Please elaborate about this. By default, cupsd only listens on localhost. Local users can do printing operations much easier.
On top of that, administrative operations are restricted to localhost: # Restrict access to the admin pages... <Location /admin> Order allow,deny Allow localhost </Location> If you manually enable cupsd to listen on all ports (as gnome-cups- manager's 'Share printer' menu option), remote printing is probably exactly what you want. :) So, what is the vulnerability here? -- [feisty] web vulnerability https://bugs.launchpad.net/bugs/106245 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs