[SECURITY] [DSA 4700-1] roundcube security update














-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4700-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
June 11, 2020                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : roundcube
CVE ID         : CVE-2020-13964 CVE-2020-13965
Debian Bug     : 962123 962124

Matei Badanoiu and LoRexxar@knownsec discovered that roundcube, a
skinnable AJAX based webmail solution for IMAP servers, did not
correctly process and sanitize requests. This would allow a remote
attacker to perform a Cross-Side Scripting (XSS) attack leading to the
execution of arbitrary code.

For the oldstable distribution (stretch), these problems have been fixed
in version 1.2.3+dfsg.1-4+deb9u5.

For the stable distribution (buster), these problems have been fixed in
version 1.3.13+dfsg.1-1~deb10u1.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl7hzMIACgkQEL6Jg/PV
nWR6HggAmeyPEJAP2BZGXhDCYvEPYERHrJ48bIINNS03qmlkdqfsnfVuwHRzcouR
QzlcPAs3vk1dCbzQYy2Jke9F4ihKersDN9Y919/EZSuaaTq0h5zm9M9Qkib+AqV+
rKTbG/LmLDCPU4krZTYUseZZBpsUcRn0lshfALUigCUKOIwvTsoUjaOy5bdRGG7t
qsKPXYq52gKZWGH0vDuXdcFzgS31OCLtXNNEManR3jzuTxZtqSOzOsKUHzzs1raO
9o7/vn4bg00BFrN6Lzysk6U3DFFf9MMhhSVFFnbY91P5s60wGGuo3osIBWQlw0PJ
++3+RHCsV7bjZut2RBzOiocVeCXSBA==
=wJd6
-----END PGP SIGNATURE-----




Reply to:










Source link

You must be logged in to post a comment.