svn commit: r428543 - head/security/vuxml
Jason Unovitch
junovitch at FreeBSD.org
Wed Dec 14 03:12:29 UTC 2016
Author: junovitch
Date: Wed Dec 14 03:12:27 2016
New Revision: 428543
URL: https://svnweb.freebsd.org/changeset/ports/428543
Log:
Update Roundcube entry with CVE and Bugtraq ID and switch to more detailed
Mitre verbiage.
PR: 214925
Security: CVE-2016-9920
Security: https://vuxml.FreeBSD.org/freebsd/125f5958-b611-11e6-a9a5-b499baebfeaf.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Dec 14 02:58:05 2016 (r428542)
+++ head/security/vuxml/vuln.xml Wed Dec 14 03:12:27 2016 (r428543)
@@ -1459,17 +1459,26 @@ Notes:
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The Roundcube project reports</p>
- <blockquote cite="https://github.com/roundcube/roundcubemail/wiki/Changelog#release-123">
- <p>Vulnerability in handling of mail()'s 5th argument</p>
+ <blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9920">
+ <p>steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before
+ 1.2.3, when no SMTP server is configured and the sendmail program is
+ enabled, does not properly restrict the use of custom envelope-from
+ addresses on the sendmail command line, which allows remote
+ authenticated users to execute arbitrary code via a modified HTTP
+ request that sends a crafted e-mail message.</p>
</blockquote>
</body>
</description>
<references>
+ <cvename>CVE-2016-9920</cvename>
+ <bid>94858</bid>
+ <url>http://www.openwall.com/lists/oss-security/2016/12/08/17</url>
<url>https://github.com/roundcube/roundcubemail/wiki/Changelog#release-123</url>
</references>
<dates>
<discovery>2016-11-29</discovery>
<entry>2016-11-29</entry>
+ <modified>2016-12-14</modified>
</dates>
</vuln>
More information about the svn-ports-all
mailing list