openSUSE Security Update : roundcubemail (openSUSE-2016-1418)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for roundcubemail fixes the following issues :

- A maliciously crafted email could cause untrusted code
to be executed (cross site scripting using $lt;area
href=javascript:...>) (boo#982003, CVE-2016-5103)

- Avoid HTML styles that could cause potential click
jacking (boo#1001856)

- A maliciously crafted FROM value could cause extra
parameters to be passed to the sendmail command
(boo#1012493)

- Avoid sending completely empty text parts for
multipart/alternative messages

- Don't create multipart/alternative messages with empty
text/plain part

- Improved validation of FROM argument when sending mails

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1001856
https://bugzilla.opensuse.org/show_bug.cgi?id=1012493
https://bugzilla.opensuse.org/show_bug.cgi?id=982003

Solution :

Update the affected roundcubemail package.

Risk factor :

High

Family: SuSE Local Security Checks

Nessus Plugin ID: 95643 ()

Bugtraq ID:

CVE ID: CVE-2016-5103

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now