drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Squirrelmail
Name: |
Ausführen beliebiger Kommandos in Squirrelmail |
|
ID: |
DSA-3852-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian jessie |
|
Datum: |
Sa, 13. Mai 2017, 20:29 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7692 |
|
Applikationen: |
Squirrelmail |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3852-1 security@debian.org https://www.debian.org/security/ Sebastien Delafond May 13, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : squirrelmail CVE ID : CVE-2017-7692
Dawid Golunski and Filippo Cavallarin discovered that squirrelmail, a webmail application, incorrectly handled a user-supplied value. This would allow a logged-in user to run arbitrary commands on the server.
For the stable distribution (jessie), this problem has been fixed in version 2:1.4.23~svn20120406-2+deb8u1.
We recommend that you upgrade your squirrelmail packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlkW6nUACgkQEL6Jg/PV nWS0xggAtJKfxL2i0spnDInK4px9AWxgazjOa9eLJ4UKoQzjTSp992rGpF7GNVPk xCX9NDdAs1+94Yd/PsD20B8GUf+w150/q6+XzyXVtZ2LH+ommvFp27wjBah+6Mju B/tG38Abs21rZfKxX0tCl9E28++3/sFZxjDdIzm+RKdivWE2j5ppqxeXVF0nsV58 1nGL4pl2ViEY9cAOPwgQFU4ZsboHi4xB4XzJzCe9z1TYMmp+OYBcaEnhllt/+kKC J3pTGLembT6qaxViyOD+8h59ncyP2KJP/Nt+ghkModFvrUdfw9wAHDABq41e4uhv cc7WOYoTCEA88Pk5HeIT3HzTMzlClQ== =CIUh -----END PGP SIGNATURE-----
|
|
|
|