openSUSE Security Update : roundcubemail (openSUSE-2016-1533)

high Nessus Plugin ID 96247

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for roundcubemail fixes the following issues :

- A maliciously crafted email could cause untrusted code to be executed (cross site scripting using $lt;area href=javascript:...>) (boo#982003, CVE-2016-5103)

- Avoid HTML styles that could cause potential click jacking (boo#1001856)

- A maliciously crafted FROM value could cause extra parameters to be passed to the sendmail command (boo#1012493)

- Avoid sending completely empty text parts for multipart/alternative messages

- Don't create multipart/alternative messages with empty text/plain part

- Improved validation of FROM argument when sending mails

Solution

Update the affected roundcubemail package.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1001856

https://bugzilla.opensuse.org/show_bug.cgi?id=1012493

https://bugzilla.opensuse.org/show_bug.cgi?id=982003

Plugin Details

Severity: High

ID: 96247

File Name: openSUSE-2016-1533.nasl

Version: 3.3

Type: local

Agent: unix

Published: 1/3/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:roundcubemail, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 12/30/2016

Reference Information

CVE: CVE-2016-5103