Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA820] DSA-820-1 courier


Vulnerability Assessment Details

[DSA820] DSA-820-1 courier

Vulnerability Assessment Summary
DSA-820-1 courier

Detailed Explanation for this Vulnerability Assessment

Jakob Balle discovered that with "Conditional Comments" in Internet
Explorer it is possible to hide javascript code in comments that will
be executed when the browser views a malicious email via sqwebmail.
Successful exploitation requires that the user is using Internet
Explorer.
For the old stable distribution (woody) this problem has been fixed in
version 0.37.3-2.7.
For the stable distribution (sarge) this problem has been fixed in
version 0.47-4sarge3.
For the unstable distribution (sid) this problem has been fixed in
version 0.47-9.
We recommend that you upgrade your sqwebmail package.


Solution : http://www.debian.org/security/2005/dsa-820
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

KingSpec 8GB DDR4 for DESKTOP LONG-DIMM Memory Module (288pin, 2400MHz, P... New
$105.99
KingSpec 8GB DDR4 for DESKTOP LONG-DIMM Memory Module (288pin, 2400MHz, P... New pictureHP PAVILION DV-4-1275MX SPECIAL EDITION ENTERTAINMENT LAPTOP 4gb RAM AMD 14 Inch
$100.0
HP PAVILION DV-4-1275MX SPECIAL EDITION ENTERTAINMENT LAPTOP 4gb RAM AMD 14 Inch pictureLenovo 8GB SO-DIMM 1600 MHz PC3-12800 DDR3 SDRAM Memory (0A65724)
$40.0
Lenovo 8GB SO-DIMM 1600 MHz PC3-12800 DDR3 SDRAM Memory (0A65724) picture


Discussions

No Discussions have been posted on this vulnerability.