Debian: horde and imp vulnerabilities
Summary
Package : horde and imp
Problem type : remote exploit
Debian-specific: no
imp as distributed in Debian GNU/Linux 2.2 suffered from insufficient
checking of user supplied data: the IMP webmail interface did not check
the $from variable which contains the sender address for shell
metacharacters. This could be used to run arbitrary commands on the
server running imp.
To fix this horde (the library imp uses) has been modified to sanitize
$from, and imp has been patched to improve checking of user input.
The updated versions are horde 1.2.1-0 and imp 2.2.1-0, and we strongly
recommend you upgrade both packages immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.1 alias slink
The slink release did not contain horde and imp.
Debian GNU/Linux 2.2 alias potato
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Source archives:
MD5 checksum: b8043b7e3ffaa77ac7e1d2ceea25...