Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.71333 |
Kategorie: | Mandrake Local Security Checks |
Titel: | Mandriva Security Advisory MDVSA-2012:072 (roundcubemail) |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing an update to roundcubemail announced via advisory MDVSA-2012:072. Multiple vulnerabilities has been found and corrected in roundcubemail: The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker' s account and then compose an e-mail message, related to a login CSRF issue (CVE-2011-1491). steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request (CVE-2011-1492). Cross-site scripting (XSS) vulnerability in the UI messages functionality in Roundcube Webmail before 0.5.4 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI (CVE-2011-2937). include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP 5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET request for an arbitrary URL, and cause a denial of service (resource consumption and inbox outage), via a Subject header containing only a URL, a related issue to CVE-2011-3379 (CVE-2011-4078). The updated packages have been upgraded to the 0.7.2 version which is not affected by these issues. Affected: Enterprise Server 5.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:072 Risk factor : High |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1491 http://openwall.com/lists/oss-security/2011/03/24/3 http://openwall.com/lists/oss-security/2011/03/24/4 http://openwall.com/lists/oss-security/2011/04/04/50 XForce ISS Database: roundcube-login-info-disclosure(66815) https://exchange.xforce.ibmcloud.com/vulnerabilities/66815 Common Vulnerability Exposure (CVE) ID: CVE-2011-1492 http://secunia.com/advisories/44050 XForce ISS Database: roundcube-modcss-security-bypass(66613) https://exchange.xforce.ibmcloud.com/vulnerabilities/66613 Common Vulnerability Exposure (CVE) ID: CVE-2011-2937 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html BugTraq ID: 49229 http://www.securityfocus.com/bid/49229 http://www.openwall.com/lists/oss-security/2011/08/18/5 http://www.openwall.com/lists/oss-security/2011/08/19/15 Common Vulnerability Exposure (CVE) ID: CVE-2011-3379 Bugtraq: 20110923 Security issue is_a function in PHP 5.3.7+ (Google Search) http://www.securityfocus.com/archive/1/519770/30/0/threaded HPdes Security Advisory: HPSBMU02786 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 HPdes Security Advisory: SSRT100877 http://www.byte.nl/blog/2011/09/23/security-bug-in-is_a-function-in-php-5-3-7-5-3-8/ http://securityreason.com/securityalert/8525 Common Vulnerability Exposure (CVE) ID: CVE-2011-4078 BugTraq ID: 50402 http://www.securityfocus.com/bid/50402 http://openwall.com/lists/oss-security/2011/10/26/6 XForce ISS Database: webmail-uri-dos(71025) https://exchange.xforce.ibmcloud.com/vulnerabilities/71025 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |