Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title New horde3 packages fix cross site scripting
Informations
Name DSA-1642 First vendor Publication 2008-09-20
Vendor Debian Last vendor Modification 2008-09-20
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Will Drewry discovered that the Horde, allows remote attackers to send an email with a crafted MIME attachment filename attribute to perform cross site scripting.

For the stable distribution (etch), this problem has been fixed in version 3.1.3-4etch4.

For the testing distribution (lenny), this problem has been fixed in version 3.2.1+debian0-2+lenny1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your horde3 package.

Original Source

Url : http://www.debian.org/security/2008/dsa-1642

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18588
 
Oval ID: oval:org.mitre.oval:def:18588
Title: DSA-1642-1 horde3 - cross site scripting
Description: Will Drewry discovered that Horde allows remote attackers to send an email with a crafted MIME attachment filename attribute to perform cross site scripting.
Family: unix Class: patch
Reference(s): DSA-1642-1
CVE-2008-3823
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): horde3
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8241
 
Oval ID: oval:org.mitre.oval:def:8241
Title: DSA-1642 horde3 -- crossite scripting
Description: Will Drewry discovered that Horde allows remote attackers to send an email with a crafted MIME attachment filename attribute to perform crossite scripting.
Family: unix Class: patch
Reference(s): DSA-1642
CVE-2008-3823
Version: 3
Platform(s): Debian GNU/Linux 4.0
Product(s): horde3
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

OpenVAS Exploits

Date Description
2010-04-06 Name : Fedora Update for horde FEDORA-2010-5483
File : nvt/gb_fedora_2010_5483_horde_fc11.nasl
2010-04-06 Name : Fedora Update for horde FEDORA-2010-5520
File : nvt/gb_fedora_2010_5520_horde_fc12.nasl
2008-09-24 Name : Debian Security Advisory DSA 1642-1 (horde3)
File : nvt/deb_1642_1.nasl
2008-09-17 Name : FreeBSD Ports: horde-base
File : nvt/freebsd_horde-base.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
48138 Horde MIME Library MIME/MIME/Contents.php Email Attachment Filename XSS

Horde contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the filenames of MIME attachements. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-5483.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-5520.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-5563.nasl - Type : ACT_GATHER_INFO
2008-09-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1642.nasl - Type : ACT_GATHER_INFO
2008-09-11 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_7d2395787ff211dd8de50030843d3802.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:27:53
  • Multiple Updates