copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ASB-2009.1082 - [Win][UNIX/Linux] Horde Application Framework/Groupware: Execute arbitrary code/commands - Remote with user interaction

Date: 15 September 2009
References: ESB-2009.1351  ESB-2010.0013  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2009.1082
           New versions of Horde Application Framework/Groupware
                     resolve multiple vulnerabilities
                             15 September 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Horde Application Framework
                      Horde Groupware Webmail Edition
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Overwrite Arbitrary Files       -- Remote with User Interaction
                      Cross-site Scripting            -- Remote/Unauthenticated      
Resolution:           Patch/Upgrade
Member content until: Thursday, October 15 2009

OVERVIEW

        New versions of the Horde Application Framework and Horde Groupware 
        Webmail Edition have been released fixing multiple security issues.


IMPACT

        The following announcements were made regarding these releases:
        
        o Horde Application Framework 3.2.5:
        
          "This is a major security release that fixes a vulnerability in the
           form library that allows overwriting of arbitrary local files with
           the permissions of the web server user. It also fixes two XSS
           vulnerabilities in the preference system and the MIME viewer library.
           The local file vulnerability can only be exploited when running an
           application that uses image form fields, like Turba H3 (2.3) or
           Ansel, and only by users who have write permissions to those
           applications" [1]
        
        o Horde Groupware Webmail Edition 1.1.6:
        
          "This is a major security release that fixes a vulnerability in the
           form library that allows overwriting of arbitrary local files with
           the permissions of the web server user. It also fixes two XSS
           vulnerabilities in the preference system and the MIME viewer
           library. The local file vulnerability can not be exploited with any
           application bundled with Horde Groupware Webmail Edition 1.1.x." [2]


MITIGATION

        The vendor recommends to upgrading to Horde Application Framework
        3.2.5 [1] and Horde Groupware Webmail Edition 1.1.6 [2] to
        resolve these issues.
        
        It is expected that other vendors which package this software will
        update soon.


REFERENCES

        [1] [announce] [SECURITY] Horde 3.2.5 (final)
            http://marc.info/?l=horde-announce&m=125291625030436&w=2

        [2] [announce] Horde Groupware Webmail Edition 1.1.6 (final)
            http://marc.info/?l=horde-announce&m=125292314007049&w=2

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKruuTNVH5XJJInbgRAkyjAKCIwwgEXu+9Sg9T3p9uCxAY1KCKIgCfdmUM
8uQ8o4iU6iT4Hxe+TG+Pnq0=
=h/1a
-----END PGP SIGNATURE-----