drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Roundcube
Name: |
Mehrere Probleme in Roundcube |
|
ID: |
USN-6848-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.10 |
|
Datum: |
Do, 27. Juni 2024, 00:00 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37384 |
|
Applikationen: |
RoundCube Webmail |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5763930915601885845== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------sELlMqDPmCurAU08FJJmtJ5y"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------sELlMqDPmCurAU08FJJmtJ5y Content-Type: multipart/mixed; boundary="------------JD9FOw5HeNmh0jMrYyCpHOf1"; protected-headers="v1" From: Allen Huang <allen.huang@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <5e55e9ed-d321-459e-a140-dad94c4c12e9@canonical.com> Subject: [USN-6848-1] Roundcube vulnerabilities
--------------JD9FOw5HeNmh0jMrYyCpHOf1 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6848-1 June 25, 2024
roundcube vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Roundcube could be made to crash or run programs if it received specially crafted input.
Software Description: - roundcube: skinnable AJAX based webmail solution for IMAP servers - metapack
Details:
Matthieu Faou and Denys Klymenko discovered that Roundcube incorrectly handled certain SVG images. A remote attacker could possibly use this issue to load arbitrary JavaScript code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-5631)
Rene Rehme discovered that Roundcube incorrectly handled certain headers. A remote attacker could possibly use this issue to load arbitrary JavaScript code. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2023-47272)
Valentin T. and Lutz Wolf discovered that Roundcube incorrectly handled certain SVG images. A remote attacker could possibly use this issue to load arbitrary JavaScript code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-37383)
Huy Nguyễn Phạm Nhật discovered that Roundcube incorrectly handled certain fields in user preferences. A remote attacker could possibly use this issue to load arbitrary JavaScript code. (CVE-2024-37384)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10 roundcube 1.6.2+dfsg-1ubuntu0.2 roundcube-core 1.6.2+dfsg-1ubuntu0.2
Ubuntu 22.04 LTS roundcube 1.5.0+dfsg.1-2ubuntu0.1~esm3 Available with Ubuntu Pro roundcube-core 1.5.0+dfsg.1-2ubuntu0.1~esm3 Available with Ubuntu Pro
Ubuntu 20.04 LTS roundcube 1.4.3+dfsg.1-1ubuntu0.1~esm4 Available with Ubuntu Pro roundcube-core 1.4.3+dfsg.1-1ubuntu0.1~esm4 Available with Ubuntu Pro
Ubuntu 18.04 LTS roundcube 1.3.6+dfsg.1-1ubuntu0.1~esm4 Available with Ubuntu Pro roundcube-core 1.3.6+dfsg.1-1ubuntu0.1~esm4 Available with Ubuntu Pro
Ubuntu 16.04 LTS roundcube 1.2~beta+dfsg.1-0ubuntu1+esm4 Available with Ubuntu Pro roundcube-core 1.2~beta+dfsg.1-0ubuntu1+esm4 Available with Ubuntu Pro
After a standard system update you need to restart Roundcube to make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6848-1 CVE-2023-47272, CVE-2023-5631, CVE-2024-37383, CVE-2024-37384, https://launchpad.net/bugs/2043396
Package Information: https://launchpad.net/ubuntu/+source/roundcube/1.6.2+dfsg-1ubuntu0.2
--------------JD9FOw5HeNmh0jMrYyCpHOf1--
--------------sELlMqDPmCurAU08FJJmtJ5y Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEhC9y9XdAFQPCvYXchGmXSGiknnUFAmZ72xgFAwAAAAAACgkQhGmXSGiknnXZ sg//Z57ozSQKzUsgSYbwKQVCDfWjx16QqtOfAADdmcLtaXQ/aHuZnHcrDvgzXVUL5AS9QAjLn0Fv 5mw4zYZECXjiO6WhF/UNjYEji8tqjKPwd2/ZwkG/I+9GjA8bXp1xxEohFSLnlauwDkd6A9AU4FBq xOOH0LUPytPeERehsBlwBc82afJ8KnAYjvsarEW31fwD7mA3Io3T4i7ZvJ4w1oVo4jICdJWaoezT tUtJvr5e5525u2DCCxzsceuk5rGe1w3iDtmXnNmLQGBvzVKT+EF7Q5+A/eFayLMYv8c+i/uoXnWp A69DIPDb/LiKUtYkoaW14lBWCPLZmECUN9MXf61Jds4tZyy+GrgR3bCgqESTrHCesxWBImIV1mXn EYxCUvsEp95HgAnd95HEbei2RufI7+crNLYfZ2UK0wmLcon6YtOf37eFACPBCDItLHUGPkAkK01E B+YwCoAk4uQ+PhZ9+5DvFmXxHiXf50VJJ1ZXTGfGklePUyVl30/DJUz6oN1f23BvNoMRVVZHOkBZ X3R2+KxX96H9Cx1/aywRt78U7z47GnpvZXWtref9jW/SL/z8WpvtEwWC7xSUJY4EtrlwlOlA6AuQ riwhGnq7MvCMusvEHp9O+FH4dPqx87y/DEm0/6pGPiy1xQotWTXf5HWinC35GnY6tPiSv95DOf82 6Sc= =7cS1 -----END PGP SIGNATURE-----
--------------sELlMqDPmCurAU08FJJmtJ5y--
--===============5763930915601885845== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============5763930915601885845==--
|
|
|
|