Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71333
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2012:072 (roundcubemail)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to roundcubemail
announced via advisory MDVSA-2012:072.

Multiple vulnerabilities has been found and corrected in roundcubemail:

The login form in Roundcube Webmail before 0.5.1 does not properly
handle a correctly authenticated but unintended login attempt, which
makes it easier for remote authenticated users to obtain sensitive
information by arranging for a victim to login to the attacker'
s
account and then compose an e-mail message, related to a login CSRF
issue (CVE-2011-1491).

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does
not properly verify that a request is an expected request for an
external Cascading Style Sheets (CSS) stylesheet, which allows remote
authenticated users to trigger arbitrary outbound TCP connections
from the server, and possibly obtain sensitive information, via a
crafted request (CVE-2011-1492).

Cross-site scripting (XSS) vulnerability in the UI messages
functionality in Roundcube Webmail before 0.5.4 allows remote attackers
to inject arbitrary web script or HTML via the _mbox parameter to
the default URI (CVE-2011-2937).

include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP
5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET
request for an arbitrary URL, and cause a denial of service (resource
consumption and inbox outage), via a Subject header containing only
a URL, a related issue to CVE-2011-3379 (CVE-2011-4078).

The updated packages have been upgraded to the 0.7.2 version which
is not affected by these issues.

Affected: Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:072

Risk factor : High

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1491
[oss-security] 20110324 CVE request: roundcube < 0.5.1 CSRF
http://openwall.com/lists/oss-security/2011/03/24/3
[oss-security] 20110324 Re: CVE request: roundcube < 0.5.1 CSRF
http://openwall.com/lists/oss-security/2011/03/24/4
[oss-security] 20110404 Re: CVE request: roundcube < 0.5.1 CSRF
http://openwall.com/lists/oss-security/2011/04/04/50
http://trac.roundcube.net/changeset/4490
http://trac.roundcube.net/wiki/Changelog
roundcube-login-info-disclosure(66815)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66815
Common Vulnerability Exposure (CVE) ID: CVE-2011-1492
44050
http://secunia.com/advisories/44050
http://trac.roundcube.net/changeset/4488
roundcube-modcss-security-bypass(66613)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66613
Common Vulnerability Exposure (CVE) ID: CVE-2011-2937
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
BugTraq ID: 49229
http://www.securityfocus.com/bid/49229
http://www.openwall.com/lists/oss-security/2011/08/18/5
http://www.openwall.com/lists/oss-security/2011/08/19/15
Common Vulnerability Exposure (CVE) ID: CVE-2011-3379
20110923 Security issue is_a function in PHP 5.3.7+
http://www.securityfocus.com/archive/1/519770/30/0/threaded
8525
http://securityreason.com/securityalert/8525
HPSBMU02786
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
SSRT100877
http://svn.php.net/viewvc/?view=revision&revision=317183
http://www.byte.nl/blog/2011/09/23/security-bug-in-is_a-function-in-php-5-3-7-5-3-8/
https://bugs.php.net/bug.php?id=55475
https://bugzilla.redhat.com/show_bug.cgi?id=741020
Common Vulnerability Exposure (CVE) ID: CVE-2011-4078
50402
http://www.securityfocus.com/bid/50402
[oss-security] 20111026 Re: CVE Request -- Round Cube Webmail -- DoS (unavailability to access user's INBOX) after receiving an email message with the URL in the Subject
http://openwall.com/lists/oss-security/2011/10/26/6
http://trac.roundcube.net/ticket/1488086
webmail-uri-dos(71025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71025
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.