This bug was fixed in the package horde3 - 3.1.4-1ubuntu0.1

---------------
horde3 (3.1.4-1ubuntu0.1) gutsy-security; urgency=low

  * SECURITY UPDATE: (LP: #203456)
   + Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5,
     and Groupware Webmail Edition before 1.0.6, when running with certain
     configurations, allows remote authenticated users to read and execute 
arbitrary
     files via ".." sequences and a null byte in the theme name.
     Fix directory traversal vulnerability in Registry.php which allows
     an attacker to read and execute arbitrary local files via crafted
     path sequences.

  * References
   + http://ftp.horde.org/pub/horde/patches/patch-horde-3.1.6-3.1.7.gz
   + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1284
   + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=470640
   + http://www.debian.org/security/2008/dsa-1519

 -- Emanuele Gentili <[EMAIL PROTECTED]>   Thu, 27 Mar 2008
14:03:40 +0100

** Changed in: horde3 (Ubuntu Gutsy)
       Status: Fix Committed => Fix Released

** Changed in: horde3 (Ubuntu Feisty)
       Status: Fix Committed => Fix Released

-- 
[horde3] [CVE-2008-1284] information disclosure
https://bugs.launchpad.net/bugs/203456
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to