Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Dec 2016 03:12:28 +0000 (UTC)
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r428543 - head/security/vuxml
Message-ID:  <201612140312.uBE3CSre078972@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: junovitch
Date: Wed Dec 14 03:12:27 2016
New Revision: 428543
URL: https://svnweb.freebsd.org/changeset/ports/428543

Log:
  Update Roundcube entry with CVE and Bugtraq ID and switch to more detailed
  Mitre verbiage.
  
  PR:		214925
  Security:	CVE-2016-9920
  Security:	https://vuxml.FreeBSD.org/freebsd/125f5958-b611-11e6-a9a5-b499baebfeaf.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Dec 14 02:58:05 2016	(r428542)
+++ head/security/vuxml/vuln.xml	Wed Dec 14 03:12:27 2016	(r428543)
@@ -1459,17 +1459,26 @@ Notes:
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The Roundcube project reports</p>
-	<blockquote cite="https://github.com/roundcube/roundcubemail/wiki/Changelog#release-123">;
-	  <p>Vulnerability in handling of mail()'s 5th argument</p>
+	<blockquote cite="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9920">;
+	  <p>steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before
+	    1.2.3, when no SMTP server is configured and the sendmail program is
+	    enabled, does not properly restrict the use of custom envelope-from
+	    addresses on the sendmail command line, which allows remote
+	    authenticated users to execute arbitrary code via a modified HTTP
+	    request that sends a crafted e-mail message.</p>
 	</blockquote>
       </body>
     </description>
     <references>
+      <cvename>CVE-2016-9920</cvename>
+      <bid>94858</bid>
+      <url>http://www.openwall.com/lists/oss-security/2016/12/08/17</url>;
       <url>https://github.com/roundcube/roundcubemail/wiki/Changelog#release-123</url>;
     </references>
     <dates>
       <discovery>2016-11-29</discovery>
       <entry>2016-11-29</entry>
+      <modified>2016-12-14</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612140312.uBE3CSre078972>