Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56581
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1034-1)
Summary:The remote host is missing an update for the Debian 'horde2' package(s) announced via the DSA-1034-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'horde2' package(s) announced via the DSA-1034-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in the Horde web application framework, which may lead to the execution of arbitrary web script code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-1260

Null characters in the URL parameter bypass a sanity check, which allowed remote attackers to read arbitrary files, which allowed information disclosure.

CVE-2006-1491

User input in the help viewer was passed unsanitised to the eval() function, which allowed injection of arbitrary web code.

The old stable distribution (woody) doesn't contain horde2 packages.

For the stable distribution (sarge) these problems have been fixed in version 2.2.8-1sarge2.

The unstable distribution (sid) does no longer contain horde2 packages.

We recommend that you upgrade your horde2 package.

Affected Software/OS:
'horde2' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-1260
BugTraq ID: 17117
http://www.securityfocus.com/bid/17117
Bugtraq: 20060315 CodeScan Advisory: Unauthenticated Arbitrary File Read in Horde v3.09 and prior (Google Search)
http://www.securityfocus.com/archive/1/427710/100/0/threaded
Debian Security Information: DSA-1033 (Google Search)
http://www.debian.org/security/2006/dsa-1033
Debian Security Information: DSA-1034 (Google Search)
http://www.debian.org/security/2006/dsa-1034
http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/043657.html
http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml
http://www.osvdb.org/23918
http://securitytracker.com/id?1015771
http://secunia.com/advisories/19246
http://secunia.com/advisories/19528
http://secunia.com/advisories/19619
http://secunia.com/advisories/19692
http://secunia.com/advisories/19897
http://securityreason.com/securityalert/590
SuSE Security Announcement: SUSE-SR:2006:009 (Google Search)
http://www.novell.com/linux/security/advisories/2006_04_28.html
http://www.vupen.com/english/advisories/2006/0959
XForce ISS Database: horde-servicesgo-information-disclosure(25239)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25239
Common Vulnerability Exposure (CVE) ID: CVE-2006-1491
BugTraq ID: 17292
http://www.securityfocus.com/bid/17292
http://securitytracker.com/id?1015841
http://secunia.com/advisories/19485
http://secunia.com/advisories/19504
SuSE Security Announcement: SUSE-SR:2006:007 (Google Search)
http://www.novell.com/linux/security/advisories/2006_07_sr.html
http://www.attrition.org/pipermail/vim/2006-March/000671.html
http://www.vupen.com/english/advisories/2006/1154
XForce ISS Database: horde-help-viewer-command-execution(25516)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25516
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.