GLSA-201612-44 : Roundcube: Arbitrary code execution

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201612-44
(Roundcube: Arbitrary code execution)

Roundcube, when no SMTP server is configured and the sendmail program is
enabled, does not properly restrict the use of custom envelope-from
addresses on the sendmail command line.

Impact :

An authenticated remote attacker could possibly execute arbitrary code
with the privileges of the process, or cause a Denial of Service
condition.

Workaround :

Don’t use a MTA (Mail Transfer Agent) in conjunction with Roundcube
which implements sendmail’s “-O” or “-X” parameter, or
configure Roundcube to use a SMTP server as recommended by upstream.

See also :

https://security.gentoo.org/glsa/201612-44

Solution :

All Roundcube users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=mail-client/roundcube-1.2.3'

Risk factor :

Medium / CVSS Base Score : 6.0
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 96124 ()

Bugtraq ID:

CVE ID: CVE-2016-9920

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now