Package: roundcube
Severity: normal

Hi,

CVE-2007-6321 details a XSS vulnerability in Roundcube 0.1rc2 and
earlier. Its only affects users of IE who are using roundcube, so it may
seem unimportant, but the sad fact of the matter is many people
still use that browser and most people who run webmail are likely to be
visited by IE users.

Please mention this CVE in any changelogs that address this issue. When
a fix is available, please upload with urgency=high to speed up
migration to testing. If you have any questions or need help, visit us
in channel #debian-security on OFTC.

URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6321
Reference: BUGTRAQ:20071209 Unsanitized scripting in RoundCube webmail
Reference: 
http://www.securityfocus.com/archive/1/archive/1/484802/100/0/threaded
Reference: http://openmya.hacker.jp/hasegawa/security/expression.txt
Reference: XF:roundcube-email-messages-xss(38981)
Reference: URL:http://xforce.iss.net/xforce/xfdb/38981

Micah


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-vserver-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to