Date: Sat, 21 Jan 2012 20:02:38 -0500 (EST) From: "Steven M. Christey" <coley@...-smtp.mitre.org> To: oss-security@...ts.openwall.com cc: Jan Lieskovsky <jlieskov@...hat.com>, "Steven M. Christey" <coley@...-smtp.mitre.org> Subject: Re: CVE Request -- Horde IMP -- Multiple XSS flaws fixed in v5.0.18 On Sat, 21 Jan 2012, Kurt Seifried wrote: > On 01/21/2012 03:44 AM, Jan Lieskovsky wrote: >> Hello Kurt, Steve, vendors, >> >> Multiple XSS flaws were adressed in the v5.0.18 version of Horde IMP >> (from ): >> >> "[mms] SECURITY: Fix XSS vulnerabilities on the compose page (traditional >> view), the contacts popup window, and with certain IMAP mailbox names." >> >> References: >>  http://www.horde.org/apps/imp/docs/CHANGES >>  http://www.horde.org/apps/imp/docs/RELEASE_NOTES >>  http://secunia.com/advisories/47580 >>  https://bugs.gentoo.org/show_bug.cgi?id=399563 >> >> Upstream patches: >>  >> https://github.com/horde/horde/commit/41136ea893b3d5a84c6228a552f8e211c90f58de >> (multiple XSS flaws) Keep this one for CVE-2012-0791 as Kurt assigned. >>  >> https://github.com/horde/horde/commit/208eae43c95136a67104f760027a8892a22b6e25 >> (XSS in email validation) While normally one might MERGE this XSS with the others, in this case we (the CVE team) happened to notice that this XSS is actually associated with a different version / product, fixed in Webmail 4.0.6: http://secunia.com/advisories/47592 http://www.horde.org/apps/webmail/docs/CHANGES Since this specific XSS is not listed in the IMP changelog, we should treat it as a different product/version, and SPLIT. So, use CVE-2012-0909 for this new one. Summary: CVE-2012-0791 - XSS in compose page, (traditional view), the contacts popup window, and with certain IMAP mailbox names. Fixed in Horde IMP v5.0.18, and apparently Webmail 4.0.6. CVE-2012-0909 (new) - XSS in email validation, related to the Form library, only affecting Webmail 4.0.6. - Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ