package: ingo1
tags: security
severity: grave

A vulnerability has been found in ingo:

procmail in Ingo H3 before 1.1.2 Horde module allows remote
authenticated users to execute arbitrary commands via shell
metacharacters in the mailbox destination of a filter rule.


This is fixed in 1.1.2. See
http://secunia.com/advisories/22482
for details.

Please mention the CVE id in the changelog.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to