|
Message-ID: <Pine.GSO.4.51.0909162129470.7046@faron.mitre.org> Date: Wed, 16 Sep 2009 21:29:53 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security <oss-security@...ts.openwall.com>, oss-security <oss-security@...ts.openwall.com> cc: "Steven M. Christey" <coley@...us.mitre.org>, Alex Legler <a3li@...too.org> Subject: Re: CVE Request -- Horde 3.3.5 ====================================================== Name: CVE-2009-3236 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3236 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292088004087&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125294558611682&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292314007049&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125295852706029&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125291625030436&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292339907481&w=2 Reference: OSVDB:58107 Reference: URL:http://www.osvdb.org/58107 Reference: SECUNIA:36665 Reference: URL:http://secunia.com/advisories/36665 Reference: XF:horde-application-form-file-overwrite(53202) Reference: URL:http://xforce.iss.net/xforce/xfdb/53202 Unspecified vulnerability in the form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files via crafted "image form fields." ====================================================== Name: CVE-2009-3237 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3237 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292088004087&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125294558611682&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292314007049&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125295852706029&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125291625030436&w=2 Reference: MLIST:[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final) Reference: URL:http://marc.info/?l=horde-announce&m=125292339907481&w=2 Reference: CONFIRM:http://bugs.horde.org/ticket/?id=8311 Reference: CONFIRM:http://bugs.horde.org/ticket/?id=8399 Reference: OSVDB:58108 Reference: URL:http://www.osvdb.org/58108 Reference: OSVDB:58109 Reference: URL:http://www.osvdb.org/58109 Reference: SECUNIA:36665 Reference: URL:http://secunia.com/advisories/36665 Reference: XF:horde-mimeviewer-xss(53200) Reference: URL:http://xforce.iss.net/xforce/xfdb/53202 Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME "text parts" that are not properly handled in the MIME viewer library (config/mime_drivers.php).
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.