Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA909] DSA-909-1 horde3


Vulnerability Assessment Details

[DSA909] DSA-909-1 horde3

Vulnerability Assessment Summary
DSA-909-1 horde3

Detailed Explanation for this Vulnerability Assessment

Daniel Schreckling discovered that the MIME viewer in horde3, a web
application suite, does not always sanitise its input leaving a
possibility to force the return of malicious code that could be
executed on the vicitims machine.
The old stable distribution (woody) does not contain horde3 packages.
For the stable distribution (sarge) these problems have been fixed in
version 3.0.4-4sarge2.
For the unstable distribution (sid) these problems have been fixed in
version 3.0.7-1.
We recommend that you upgrade your horde3 package.


Solution : http://www.debian.org/security/2005/dsa-909
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Dell PowerEdge 1850 Server Power Supply Module JD090 Grade A
$24.99
Dell PowerEdge 1850 Server Power Supply Module  JD090 Grade A pictureDell PowerEdge R610 2x X5660 2.8GHz 6 Core 48GB 6x 256GB SATA SSD PERC 6/i
$1245.0
Dell PowerEdge R610 2x X5660 2.8GHz 6 Core 48GB 6x 256GB SATA SSD PERC 6/i pictureDell PowerEdge R730 2x E5-2690v3 2.6GHz 12 Core 384GB 4x 146GB 15K SAS H730 RAID
$9175.0
Dell PowerEdge R730 2x E5-2690v3 2.6GHz 12 Core 384GB 4x 146GB 15K SAS H730 RAID pictureDELL PE1950 SERVER SYSTEM BOARD DT097
$50.0
DELL PE1950 SERVER SYSTEM BOARD DT097 picture


Discussions

No Discussions have been posted on this vulnerability.