On Mon, 29 Aug 2005 23:35:14 +0200
Florian Weimer <[EMAIL PROTECTED]> wrote:

> Package: sqwebmail
> Version: 0.47-4
> Tags: security sarge
> 
> Secunia has reported a cross-site scripting vulnerability:
> 
> <http://secunia.com/advisories/16600/>
> 
> According to them, the bug is also present in the 4.x/0.4x versions.
> 
> The vendor has confirmed this for the 5.x versions:
> 
> <http://cvs.sourceforge.net/viewcvs.py/*checkout*/courier/courier/webmail/ChangeLog?content-type=text/plain&rev=sqwebmail-latest>
> 

Tested patch for the version in sarge is attached.

Bye
        Racke


-- 
LinuXia Systems => http://www.linuxia.de/
Expert Interchange Consulting and System Administration
ICDEVGROUP => http://www.icdevgroup.org/
Interchange Development Team

Attachment: CAN-2005-2724.patch
Description: Binary data

Reply via email to