Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.703416
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 3416-1 (libphp-phpmailer - security update)
Zusammenfassung:Takeshi Terada discovered a vulnerability;in PHPMailer, a PHP library for email transfer, used by many CMSs. The library;accepted email addresses and SMTP commands containing line breaks, which can be;abused by an attacker to inject messages.
Beschreibung:Summary:
Takeshi Terada discovered a vulnerability
in PHPMailer, a PHP library for email transfer, used by many CMSs. The library
accepted email addresses and SMTP commands containing line breaks, which can be
abused by an attacker to inject messages.

Affected Software/OS:
libphp-phpmailer on Debian Linux

Solution:
For the oldstable distribution
(wheezy), this problem has been fixed in version 5.1-1.1.

For the stable distribution (jessie), this problem has been fixed in
version 5.2.9+dfsg-2+deb8u1.

For the unstable distribution (sid), this problem has been fixed in
version 5.2.14+dfsg-1.

We recommend that you upgrade your libphp-phpmailer packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-8476
BugTraq ID: 78619
http://www.securityfocus.com/bid/78619
Debian Security Information: DSA-3416 (Google Search)
http://www.debian.org/security/2015/dsa-3416
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html
http://www.openwall.com/lists/oss-security/2015/12/04/5
http://www.openwall.com/lists/oss-security/2015/12/05/1
CopyrightCopyright (c) 2015 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.