You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa roundcubemail

Sigurnosni nedostatak programskog paketa roundcubemail

openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:3309-1
Rating: important
References: #1001856 #1012493 #982003
Cross-References: CVE-2016-5103
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:

This update for roundcubemail fixes the following issues:

– A maliciously crafted email could cause untrusted code to be executed
(cross site scripting using $lt;area href=javascript:…>)
(boo#982003, CVE-2016-5103)
– Avoid HTML styles that could cause potential click jacking
(boo#1001856)
– A maliciously crafted FROM value could cause extra parameters to be
passed to the sendmail command (boo#1012493)
– Avoid sending completely empty text parts for multipart/alternative
messages
– Don’t create multipart/alternative messages with empty text/plain part
– Improved validation of FROM argument when sending mails

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.1:

zypper in -t patch 2016-1533=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.1 (noarch):

roundcubemail-1.0.9-2.36.1

References:

https://www.suse.com/security/cve/CVE-2016-5103.html
https://bugzilla.suse.com/1001856
https://bugzilla.suse.com/1012493
https://bugzilla.suse.com/982003


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa BusyBox

Otkriven je sigurnosni nedostatak u programskom paketu BusyBox za operacijski sustav Gentoo. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close