Ubuntu 16.04 LTS / 18.04 LTS : Roundcube Webmail vulnerabilities (USN-8132-1)

high Nessus Plugin ID 304432

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 16.04 LTS / 18.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8132-1 advisory.

It was discovered that Roundcube Webmail did not properly sanitize

certain HTML elements within the e-mail body. An attacker could possibly

use this issue to cause a cross-site scripting attack. This issue was only

addressed in Ubuntu 16.04 LTS. (CVE-2016-4068, CVE-2016-4069)

It was discovered that Roundcube Webmail did not properly handle certain

configuration parameters. An attacker could possibly use this issue to

execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS.

(CVE-2016-9920)

It was discovered that Roundcube Webmail did not properly sanitize CSS styles

within SVG documents. An attacker could possibly use this issue to cause

a cross-site scripting attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2017-6820)

It was discovered that Roundcube Webmail did not properly restrict exec call in

certain drivers of the password plugin. An authenticated user could possibly

use this issue to perform arbitrary password resets. This issue was only addressed in

Ubuntu 16.04 LTS. (CVE-2017-8114)

It was discovered that Roundcube Webmail did not properly set file permissions within

the Enigma plugin. An attacker could possibly use this issue to exfiltrate GPG private

keys via network connectivity. (CVE-2018-1000071)

It was discovered that Roundcube Webmail did not properly handle GnuPG MDC

integrity-protection warnings. An attacker could possibly use this issue to obtain

sensitive information from encrypted communications. (CVE-2018-19205)

It was discovered that Roundcube Webmail did not properly sanitize <svg> and <style> tags within HTML attachments. An attacker could possibly use this issue to cause a

cross-site scripting attack. (CVE-2018-19206)

It was discovered that Roundcube Webmail did not properly handle partially encrypted multipart messages.
An attacker could possibly use this issue to cause

leaking of the plaintext of encrypted messages via an email reply. (CVE-2019-10740)

It was discovered that Roundcube Webmail did not properly sanitize a certain parameter

within the archive plugin. An attacker could possibly use this issue to perform an

IMAP injection attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2018-9846)

Tenable has extracted the preceding description block directly from the Ubuntu security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-8132-1

Plugin Details

Severity: High

ID: 304432

File Name: ubuntu_USN-8132-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/31/2026

Updated: 3/31/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-9846

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:roundcube-sqlite3, p-cpe:/a:canonical:ubuntu_linux:roundcube-core, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:roundcube, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:roundcube-mysql, p-cpe:/a:canonical:ubuntu_linux:roundcube-pgsql, p-cpe:/a:canonical:ubuntu_linux:roundcube-plugins

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/30/2026

Vulnerability Publication Date: 4/21/2016

Reference Information

CVE: CVE-2016-4068, CVE-2016-4069, CVE-2016-9920, CVE-2017-6820, CVE-2017-8114, CVE-2018-1000071, CVE-2018-19205, CVE-2018-19206, CVE-2018-9846, CVE-2019-10740

IAVA: 2026-A-0159

USN: 8132-1