Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.71333
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2012:072 (roundcubemail)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to roundcubemail
announced via advisory MDVSA-2012:072.

Multiple vulnerabilities has been found and corrected in roundcubemail:

The login form in Roundcube Webmail before 0.5.1 does not properly
handle a correctly authenticated but unintended login attempt, which
makes it easier for remote authenticated users to obtain sensitive
information by arranging for a victim to login to the attacker'
s
account and then compose an e-mail message, related to a login CSRF
issue (CVE-2011-1491).

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does
not properly verify that a request is an expected request for an
external Cascading Style Sheets (CSS) stylesheet, which allows remote
authenticated users to trigger arbitrary outbound TCP connections
from the server, and possibly obtain sensitive information, via a
crafted request (CVE-2011-1492).

Cross-site scripting (XSS) vulnerability in the UI messages
functionality in Roundcube Webmail before 0.5.4 allows remote attackers
to inject arbitrary web script or HTML via the _mbox parameter to
the default URI (CVE-2011-2937).

include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP
5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET
request for an arbitrary URL, and cause a denial of service (resource
consumption and inbox outage), via a Subject header containing only
a URL, a related issue to CVE-2011-3379 (CVE-2011-4078).

The updated packages have been upgraded to the 0.7.2 version which
is not affected by these issues.

Affected: Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:072

Risk factor : High

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1491
http://openwall.com/lists/oss-security/2011/03/24/3
http://openwall.com/lists/oss-security/2011/03/24/4
http://openwall.com/lists/oss-security/2011/04/04/50
XForce ISS Database: roundcube-login-info-disclosure(66815)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66815
Common Vulnerability Exposure (CVE) ID: CVE-2011-1492
http://secunia.com/advisories/44050
XForce ISS Database: roundcube-modcss-security-bypass(66613)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66613
Common Vulnerability Exposure (CVE) ID: CVE-2011-2937
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
BugTraq ID: 49229
http://www.securityfocus.com/bid/49229
http://www.openwall.com/lists/oss-security/2011/08/18/5
http://www.openwall.com/lists/oss-security/2011/08/19/15
Common Vulnerability Exposure (CVE) ID: CVE-2011-3379
Bugtraq: 20110923 Security issue is_a function in PHP 5.3.7+ (Google Search)
http://www.securityfocus.com/archive/1/519770/30/0/threaded
HPdes Security Advisory: HPSBMU02786
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
HPdes Security Advisory: SSRT100877
http://www.byte.nl/blog/2011/09/23/security-bug-in-is_a-function-in-php-5-3-7-5-3-8/
http://securityreason.com/securityalert/8525
Common Vulnerability Exposure (CVE) ID: CVE-2011-4078
BugTraq ID: 50402
http://www.securityfocus.com/bid/50402
http://openwall.com/lists/oss-security/2011/10/26/6
XForce ISS Database: webmail-uri-dos(71025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71025
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.