|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: roundcube|
|Summary:||FreeBSD Ports: roundcube|
|Description:||The remote host is missing an update to the system|
as announced in the referenced advisory.
The following package is affected: roundcube
html2text.php in RoundCube Webmail (roundcubemail) 0.2-1.alpha and
0.2-3.beta allows remote attackers to execute arbitrary code via
crafted input that is processed by the preg_replace function with the
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2008-5619|
Bugtraq: 20081222 POC for CVE-2008-5619 (roundcubemail PHP arbitrary code injection) (Google Search)
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.