Please elaborate about this. By default, cupsd only listens on
localhost. Local users can do printing operations much easier.

On top of that, administrative operations are restricted to localhost:

  # Restrict access to the admin pages...
  <Location /admin>
    Order allow,deny
    Allow localhost
  </Location>

If you manually enable cupsd to listen on all ports (as gnome-cups-
manager's 'Share printer' menu option), remote printing is probably
exactly what you want. :)

So, what is the vulnerability here?

-- 
[feisty] web vulnerability 
https://bugs.launchpad.net/bugs/106245
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to