ESB-2017.2864 - [Linux][Debian] roundcube: Access confidential data - Existing account 2017-11-10

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2864
                         roundcube security update
                             10 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           roundcube
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Linux variants
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-16651  

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-4030

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running roundcube check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4030-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 09, 2017                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : roundcube
CVE ID         : CVE-2017-16651

A file disclosure vulnerability was discovered in roundcube, a skinnable
AJAX based webmail solution for IMAP servers. An authenticated attacker
can take advantage of this flaw to read roundcube's configuration files.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.3+dfsg.1-4+deb9u1.

For the unstable distribution (sid), this problem has been fixed in
version 1.3.3+dfsg.1-1.

We recommend that you upgrade your roundcube packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=677c
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VXc/
-----END PGP SIGNATURE-----

« Back to bulletins