![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.53844 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 126-1 (imp) |
Summary: | The remote host is missing an update to imp;announced via advisory DSA 126-1. |
Description: | Summary: The remote host is missing an update to imp announced via advisory DSA 126-1. Vulnerability Insight: A cross-site scripting (CSS) problem was discovered in Horde and IMP (a web based IMAP mail package). This was fixed upstream in Horde version 1.2.8 and IMP version 2.2.8. The relevant patches have been back-ported to version 1.2.6-0.potato.5 of the horde package and version 2.2.6-0.potato.5 of the imp package. This release also fixes a bug introduced by the php security fix from DSA-115-1: the php postgres support changed subtle which broke the postgres support from imp. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-0181 BugTraq ID: 4444 http://www.securityfocus.com/bid/4444 Bugtraq: 20020406 IMP 2.2.8 (SECURITY) released (Google Search) http://marc.info/?l=bugtraq&m=101828033830744&w=2 Caldera Security Advisory: CSSA-2002-016.1 http://www.calderasystems.com/support/security/advisories/CSSA-2002-016.1.txt Conectiva Linux advisory: CLA-2001:473 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000473 Debian Security Information: DSA-126 (Google Search) http://www.debian.org/security/2002/dsa-126 http://bugs.horde.org/show_bug.cgi?id=916 http://www.osvdb.org/5345 http://www.iss.net/security_center/static/8769.php |
Copyright | Copyright (C) 2008 E-Soft Inc. |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |