CVSROOT:        /cvs
Module name:    ports
Changes by:     st...@cvs.openbsd.org   2017/11/09 09:28:55

Modified files:
        mail/roundcubemail: Tag: OPENBSD_6_2 Makefile distinfo 
        mail/roundcubemail/pkg: Tag: OPENBSD_6_2 PLIST 

Log message:
security update to roundcubemail-1.3.3:

"Apparently this zero-day exploit is already being used by hackers to
read Roundcube’s configuration files. It requires a valid
username/password as the exploit only works with a valid session. More
details will be published soon under CVE-2017-16651.

In order to check whether your Roundcube installation has been
compromised check the access logs for requests like

?_task=settings&_action=upload-display&_from=timezone

As mentioned above, the file disclosure only works for authenticated
users and by finding such requests in the logs you should also be able
to identify the account used for this unauthorized access. For
mitigation we recommend to change the all credentials to external
services like database or LDAP address books and preferably also the
'des_key' option in your config."

Reply via email to