Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: Apps A-M :: imp6.htm

IMP prior to 2.2.6 - 3 security issues



    IMP prior to 2.2.6


    Brent J. Nordquist posted following.  The Horde team announces
    the availability of IMP 2.2.6, which fixes three potential
    security issues.

    (1)  A  PHPLIB  vulnerability  allowed  an  attacker to provide  a
         value for the array element $_PHPLIB[libdir], and thus to get
         scripts from another server to load and execute. Incidentally
         this problem is not  remotely exploitable if you  have turned
         off transparent URL handling in the fopen() function in  PHP.
         (Horde 1.2.x ships with its own customized version of PHPLIB,
         which has now been patched to prevent this problem.)

    (2)  By  using tricky encodings  of "javascript:" an  attacker can
         cause malicious JavaScript code to execute in the browser  of
         a user reading  email sent by  attacker.  (IMP  2.2.x already
         filters  many  such  patterns;  several  new  ones  that were
         slipping past the filters are now blocked.)

    (3)  A hostile user that can create a publicly-readable file named
         "prefs.lang"  somewhere  on  the  Apache/PHP server can cause
         that file to be executed as PHP code.  The IMP  configuration
         files could thus  be read, the  Horde database password  used
         to read  and alter  the database  used to  store contacts and
         preferences,  etc.   We  do  not  believe  this  is  remotely
         exploitable directly  through Apache/PHP/IMP;  however, shell
         access to  the server  or other  means (e.g.,  FTP) could  be
         used to create this file.

    The  Horde  Project  would  like  to  thank Giancarlo Pinerolo for
    reporting problem (1) and Nick Cleaton for reporting problem  (2).
    Problem  (3)  was  discovered  during  an internal audit resulting
    from the "Study  in Scarlet" paper  by Shaun Clowes.   Problem (3)
    was the  only "scarlet"-type  vulnerability discovered  during the
    audit; the code looks very good in this regard.


    We strongly recommend that all sites running IMP 2.2.x upgrade  to
    this version.  This release  can be downloaded from the  following

    For Conectiva Linux:

    For Caldera:

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH