Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 16 Dec 2008 20:31:51 -0500 (EST)
From: "Steven M. Christey" <>
Subject: Re:  Re: CVE Request - roundcubemail

On Sat, 13 Dec 2008, Florian Weimer wrote:

> * Ingrid wrote:
> > Therefore, I agree with Raphael that the issue has not been found yet.

The general issue of /e in preg_replace is covered by CWE-624 Executable
Regular Expression Error (
which has a couple other CVE examples.

I bet there's a chunk of these in various applications.  I believe Perl
has similar functionality.

Use CVE-2008-5619 for the issue.

Note there's a separate DoS issue, CVE-2008-5620.

- Steve

Name: CVE-2008-5619
Status: Candidate
Reference: MISC:
Reference: CONFIRM:
Reference: CONFIRM:
Reference: FEDORA:FEDORA-2008-11220
Reference: URL:
Reference: FEDORA:FEDORA-2008-11234
Reference: URL:
Reference: MLIST:[oss-security] 20081212 CVE Request - roundcubemail
Reference: URL:
Reference: SECUNIA:33170
Reference: URL:

html2text.php in RoundCube Webmail (roundcubemail) 0.2-1.alpha and
0.2-3.beta allows remote attackers to execute arbitrary code via
crafted input that is processed by the preg_replace function with the
eval switch.

Name: CVE-2008-5620
Status: Candidate
Reference: CONFIRM:

RoundCube Webmail (roundcubemail) before 0.2-beta allows remote
attackers to cause a denial of service (memory consumption) via
crafted size parameters that are used to create a large quota image.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.