ESB-2018.3669 - [Debian] roundcube: Cross-site scripting - Remote with user interaction 2018-11-27

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3669
                  [DSA 4344-1] roundcube security update
                             27 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           roundcube
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19206  

Reference:         ESB-2018.3650

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4344

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4344-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 24, 2018                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : roundcube
CVE ID         : CVE-2018-19206

Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail
solution for IMAP servers, is prone to a cross-site scripting
vulnerability in handling invalid style tag content.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.3+dfsg.1-4+deb9u3.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/roundcube

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlv5uYVfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0SU1w//YkLqGUCLGeFqjofgYMTNxoMQtcUwtqmBgX6tXv5Uu6mjFw8VWMw7rZhT
F43NWzypKejgNRdpPhO9QUXskGXbXXwLHqfoNeOEhXpOD69kQ5uUPWTi0KCrtlRN
rQMt8tOgscPNuxbk8FPE47ZmvfFHE9ASBKf6NRY5eu2/p87GDjMV6JgjloOcFDCE
wCoosrXKxQO0AtiTJcWslIlBsxQtf1s7r+t4AIOUAxOZmyzKPcjQ5AtYviRWAdZM
TRAjc4XXBKYMp6wCZh7ibUzWy/q6QRtfYbtEUtKmyhhn69x6fhoWBMZ4wWohvfhN
ok+X6pd7djYA5wtFzj3n6jS9hxMGu5TNn5MgYh/gnX0ujPAfJvHaDprskdmyL0z0
gSzAmvQybkfWd9O2LSJVJ8+x9YM/CjchZ+8Q/jUmm8dykr8FnYwlA3ihB1zpYBdV
8BfzUL9MoTVZoBwtkiUBOVWnTzKyij+h/1WcQCADeTKoXIy5cO4X6vxAaies8b87
mGCJ2354UMPmr0RssIbTa3YikDeXVkbJbSD3V+jfuvs0/gDNsEopG6kHIiOV75/R
Q93vfSx0u5UvrUSQLlCGlDoUxEIzFllrJnoZ0c6o6JKeRezp4kKzFFDDzjsaAeQ1
EbpMx91AaF5L/Qs/ERwxFHglyljl6XYs/JZGAgrcUDw1DZcLoKs=
=qFzO
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=5gW6
-----END PGP SIGNATURE-----

« Back to bulletins