Debian Security Advisory

DLA-613-1 roundcube -- LTS security update

Date Reported:
08 Sep 2016
Affected Packages:
roundcube
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 822333, Bug 775576, Bug 776700.
In Mitre's CVE dictionary: CVE-2014-9587, CVE-2015-1433, CVE-2016-4069.
More information:

Multiple CSRF and XSS issues allow remote attackers to hijack the authentication and execute roundcube operations without the consent of the user. In some cases, this could result in data loss or data theft.

  • CVE-2014-9587

    Multiple cross-site request forgery (CSRF) vulnerabilities in allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to (1) address book operations or the (2) ACL or (3) Managesieve plugins.

  • CVE-2015-1433

    Incorrect quotation logic during sanitization of style HTML attribute allows remote attackers to execute arbitrary javascript code on the user's browser.

  • CVE-2016-4069

    Cross-site request forgery (CSRF) vulnerability allows remote attackers to hijack the authentication of users for requests that download attachments and cause a denial of service (disk consumption) via unspecified vectors.

For Debian 7 Wheezy, these problems have been fixed in version 0.7.2-9+deb7u4.

We recommend that you upgrade your roundcube packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS