Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titleroundcube security update
Informations
NameDSA-4344First vendor Publication2018-11-24
VendorDebianLast vendor Modification2018-11-24
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Aidan Marlin discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, is prone to a cross-site scripting vulnerability in handling invalid style tag content.

For the stable distribution (stretch), this problem has been fixed in version 1.2.3+dfsg.1-4+deb9u3.

We recommend that you upgrade your roundcube packages.

For the detailed security status of roundcube please refer to its security tracker page at: https://security-tracker.debian.org/tracker/roundcube

Original Source

Url : http://www.debian.org/security/2018/dsa-4344

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1

Nessus® Vulnerability Scanner

DateDescription
2018-11-26Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4344.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2018-12-13 17:21:21
  • Multiple Updates
2018-11-25 00:19:39
  • First insertion