Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.61157 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 9 FEDORA-2008-5333 (roundcubemail) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to roundcubemail announced via advisory FEDORA-2008-5333. RoundCube Webmail is a browser-based multilingual IMAP client with an application-like user interface. It provides full functionality you expect from an e-mail client, including MIME support, address book, folder manipulation, message searching and spell checking. RoundCube Webmail is written in PHP and requires the MySQL database or the PostgreSQL database. The user interface is fully skinnable using XHTML and CSS 2. Update Information: XSS fixes. Requires manual intervention for DB upgrades, see UPGRADING for details. ChangeLog: * Fri Jun 13 2008 Jon Ciesla = 0.2-0.alpha - Update to 0.2-alpha, security fixes for BZ 423271. - mysql update and pear patches applied upstream. - Patched config paths. References: [ 1 ] Bug #423271 - CVE-2007-6321 roundcubemail: XSS vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=423271 Solution: Apply the appropriate updates. This update can be installed with the yum update program. Use su -c 'yum update roundcubemail' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-5333 Risk factor : Medium CVSS Score: 4.3 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-6321 BugTraq ID: 26800 http://www.securityfocus.com/bid/26800 Bugtraq: 20071209 Unsanitized scripting in RoundCube webmail (Google Search) http://www.securityfocus.com/archive/1/484802/100/0/threaded http://openmya.hacker.jp/hasegawa/security/expression.txt http://secunia.com/advisories/30734 http://securityreason.com/securityalert/3435 XForce ISS Database: roundcube-email-messages-xss(38981) https://exchange.xforce.ibmcloud.com/vulnerabilities/38981 |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |