drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in RoundCube Webmail
Name: |
Preisgabe von Informationen in RoundCube Webmail |
|
ID: |
DSA-4030-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian stretch |
|
Datum: |
Do, 9. November 2017, 22:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16651 |
|
Applikationen: |
RoundCube Webmail |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4030-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 09, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : roundcube CVE ID : CVE-2017-16651
A file disclosure vulnerability was discovered in roundcube, a skinnable AJAX based webmail solution for IMAP servers. An authenticated attacker can take advantage of this flaw to read roundcube's configuration files.
For the stable distribution (stretch), this problem has been fixed in version 1.2.3+dfsg.1-4+deb9u1.
For the unstable distribution (sid), this problem has been fixed in version 1.3.3+dfsg.1-1.
We recommend that you upgrade your roundcube packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAloErkZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RjtA/+Kgl5Cjdta2WT7c1OK5rbhfQUaFl1Z27/nT3nTPso8ExB+yUS13ya7fNS 3Oehz8VCZ9vkLywMht904b+A0eZAMyHvrhvVDktqFf0ETl4P8+6Oh37XVP1vRXtu bJB3Aikm4M2r4Z92i09x/vNYgpy+ae2HM3nvl0BjGhqqwkhDSJaQNXGjryts61MS BpT4yFbiG17tsMt8pfoAq7fwEeFFD3LGbj4bhISrlGN3H7iQzezhAJQgjiGLgLP+ srHg5dtJV9EHQwrTeqsdUBQ10E6Neq+ShAsrJZQJAJ4+tnQmX2+S0/a2dyhA72rI fE3FFHV8kxRIXA/H6K7SOjkjn1k4jvwG2VmXyOOb+hImiASWTh3uViYfF9dQKXwX w5fnQFsx7DP34GwNlKDbWWAuCT7WDbMMsWZdFBHkPot57WJjBVI7b4ue/EN3GgfX UxUSujSQwxD15wGX5JDk2uMMC12xUDE2ZXknDE/RFXdC7Fem03mol6e6gz0H8z6Q uZDy6FdTgIKKDVKqIrmaJltq3uD5wgDIhW0WQN1j5x8zsERWoFIZEhzgRr+qE7Jx D0ZqyJs54dazgRKKSsaB5V8ETIxyouEP1E3DbVRlsCXjzTzfYLWPYKq8ZERfUJra eNDye/8mx8dvt9ma2Hz8kwzRUyiPKP7k4GBYW7LZc/GZz0Ef5eY= =677c -----END PGP SIGNATURE-----
|
|
|
|