Debian alert: Horde and IMP cross-site scripting attack

Posted by dave on Apr 16, 2002 7:34 AM EDT
Mailing list
Mail this story
Print this story

A cross-site scripting (CSS) problem was discovered in Horde and IMP (a web based IMAP mail package). This was fixed upstream in Horde version 1.2.8 and IMP version 2.2.8. The relevant patches have been back-ported to version 1.2.6-0.potato.5 of the horde package and version 2.2.6-0.potato.5 of the imp package.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-126-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
April 16, 2002
- ------------------------------------------------------------------------


Package        : imp
Problem type   : cross-site scripting (CSS)
Debian-specific: no


A cross-site scripting (CSS) problem was discovered in Horde and IMP (a web
based IMAP mail package). This was fixed upstream in Horde version 1.2.8
and IMP version 2.2.8. The relevant patches have been back-ported to 
version 1.2.6-0.potato.5 of the horde package and version 2.2.6-0.potato.5
of the imp package.

This release also fixes a bug introduced by the php security fix from 
DSA-115-1: the php postgres support changed subtle which broke the
postgres support from imp. 


wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/horde_1.2.6-0.potato.5.dsc
      MD5 checksum: b77256b8029270a8de5240e8a5533cae
    http://security.debian.org/dists/stable/updates/main/source/horde_1.2.6-0.potato.5.tar.gz
      MD5 checksum: 85ec854ef905a906997088649a12d60c
    http://security.debian.org/dists/stable/updates/main/source/imp_2.2.6-0.potato.5.dsc
      MD5 checksum: e8c010d3227f4c55e5b5c68b9921aee5
    http://security.debian.org/dists/stable/updates/main/source/imp_2.2.6-0.potato.5.tar.gz
      MD5 checksum: a874af4a6ef5ef8b3e5fd59f40db13c2

  Architecture independent archives:
    http://security.debian.org/dists/stable/updates/main/binary-all/horde_1.2.6-0.potato.5_all.deb
      MD5 checksum: df0fe8f732da4edee3f78202c9e2127a
    http://security.debian.org/dists/stable/updates/main/binary-all/imp_2.2.6-0.potato.5_all.deb
      MD5 checksum: ffd216c15b27c1c3449512a5ccaa5af2

  These packages will be moved into the stable distribution on its next
  revision.

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBPLxETqjZR/ntlUftAQH8eAL/XDyfPIO/SQf4yXRwmoBZ0N/VDXC6qOM4
unkIHH+S/9H5PzMqrB+UqOa/8+Zfs4aYGbXIz+n0oRGyhkrDo0vb/thT8+WqaZRc
2CiLTCG2oXrv5D5wuDzDm7BR5TN7M4E+
=9ml0
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.