A vulnerability in Roundcube could result in arbitrary code execution, SQL injection, or reading of arbitrary files.
|Package||mail-client/roundcube on all architectures|
|Affected versions||< 0.9.5|
|Unaffected versions||>= 0.9.5
revision >= 0.8.7
Roundcube is a browser-based multilingual IMAP client with an application-like user interface.
A vulnerability in steps/utils/save_pref.inc allows remote attackers to use the _session parameter to change configuration settings.
A remote attacker could possibly execute arbitrary code with the privileges of the process, inject SQL code, or read arbitrary files.
There is no known workaround at this time.
All Roundcube 0.9 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.9.5"
All Roundcube 0.8 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.8.7"
February 11, 2014
February 11, 2014: 1