GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Feb 11, 2014 10:26 am Post subject: [ GLSA 201402-15 ] Roundcube: Arbitrary code execution |
|
|
Gentoo Linux Security Advisory
Title: Roundcube: Arbitrary code execution (GLSA 201402-15)
Severity: high
Exploitable: remote
Date: February 11, 2014
Bug(s): #488954
ID: 201402-15
Synopsis
A vulnerability in Roundcube could result in arbitrary code
execution, SQL injection, or reading of arbitrary files.
Background
Roundcube is a browser-based multilingual IMAP client with an
application-like user interface.
Affected Packages
Package: mail-client/roundcube
Vulnerable: < 0.9.5
Unaffected: >= 0.9.5
Unaffected: >= 0.8.7 < 0.8.8
Architectures: All supported architectures
Description
A vulnerability in steps/utils/save_pref.inc allows remote attackers to
use the _session parameter to change configuration settings.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process, inject SQL code, or read arbitrary files.
Workaround
There is no known workaround at this time.
Resolution
All Roundcube 0.9 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.9.5"
| All Roundcube 0.8 users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.8.7"
|
References
CVE-2013-6172 |
|