MGASA-2015-0400

Source
https://advisories.mageia.org/MGASA-2015-0400.html
Import Source
https://advisories.mageia.org/MGASA-2015-0400.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0400
Related
Published
2015-10-14T20:28:21Z
Modified
2015-10-14T20:25:28Z
Summary
Updated roundcubemail package fixes security vulnerabilities
Details

Multiple security issues in the DBMail driver for the password plugin, including buffer overflows (CVE-2015-2181) and the ability for a remote attacker to execute arbitrary shell commands as root (CVE-2015-2180).

An authenticated user can download arbitrary files from the web server that the web server process has read access to, by uploading a vCard with a specially crafted POST (CVE-2015-5382).

The roundcubemail package has been updated to version 1.0.6, fixing these issues and several other bugs, however the installer is currently known to be broken.

References
Credits

Affected packages

Mageia:5 / roundcubemail

Package

Name
roundcubemail
Purl
pkg:rpm/mageia/roundcubemail?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.6-1.1.mga5

Ecosystem specific

{
    "section": "core"
}