Upstream information
Description
Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.5 |
Vector | AV:N/AC:L/Au:S/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- openSUSE-SU-2015:1240-1, published Tue, 14 Jul 2015 11:07:55 +0200 (CEST)
- openSUSE-SU-2016:2108-1, published Fri, 19 Aug 2016 17:08:58 +0200 (CEST)
- openSUSE-SU-2016:2109-1, published Fri, 19 Aug 2016 17:09:14 +0200 (CEST)
- openSUSE-SU-2016:2127-1, published Mon, 22 Aug 2016 13:09:55 +0200 (CEST)
- openSUSE-SU-2016:3038-1, published Wed, 7 Dec 2016 15:11:46 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA roundcubemail-1.2.3-1.1 |
SUSE Timeline for this CVE
CVE page created: Sun Apr 24 02:15:18 2016CVE page last modified: Fri Oct 7 12:47:04 2022