Lucene search

K
nessusThis script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.GENTOO_GLSA-200408-07.NASL
HistoryAug 30, 2004 - 12:00 a.m.

GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users

2004-08-3000:00:00
This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9

The remote host is affected by the vulnerability described in GLSA-200408-07 (Horde-IMP: Input validation vulnerability for Internet Explorer users)

Horde-IMP fails to properly sanitize email messages that contain     malicious HTML or script code so that it is not safe for users of     Internet Explorer when using the inline MIME viewer for HTML messages.

Impact :

By enticing a user to read a specially crafted e-mail, an attacker can     execute arbitrary scripts running in the context of the victim's     browser. This could lead to a compromise of the user's webmail account,     cookie theft, etc.

Workaround :

Do not use Internet Explorer to access Horde-IMP.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Gentoo Linux Security Advisory GLSA 200408-07.
#
# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.
# and licensed under the Creative Commons - Attribution / Share Alike 
# license. See http://creativecommons.org/licenses/by-sa/3.0/
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(14563);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id("CVE-2004-1443");
  script_xref(name:"GLSA", value:"200408-07");

  script_name(english:"GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users");
  script_summary(english:"Checks for updated package(s) in /var/db/pkg");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Gentoo host is missing one or more security-related
patches."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"The remote host is affected by the vulnerability described in GLSA-200408-07
(Horde-IMP: Input validation vulnerability for Internet Explorer users)

    Horde-IMP fails to properly sanitize email messages that contain
    malicious HTML or script code so that it is not safe for users of
    Internet Explorer when using the inline MIME viewer for HTML messages.
  
Impact :

    By enticing a user to read a specially crafted e-mail, an attacker can
    execute arbitrary scripts running in the context of the victim's
    browser. This could lead to a compromise of the user's webmail account,
    cookie theft, etc.
  
Workaround :

    Do not use Internet Explorer to access Horde-IMP."
  );
  # http://cvs.horde.org/diff.php/imp/docs/CHANGES?r1=1.389.2.106&r2=1.389.2.109&ty=h
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?668f53c2"
  );
  # http://secunia.com/advisories/12202/
  script_set_attribute(
    attribute:"see_also",
    value:"https://secuniaresearch.flexerasoftware.com/advisories/12202/"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security.gentoo.org/glsa/200408-07"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"All Horde-IMP users should upgrade to the latest stable version:
    # emerge sync
    # emerge -pv '>=www-apps/horde-imp-3.2.5'
    # emerge '>=www-apps/horde-imp-3.2.5'"
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:horde-imp");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");

  script_set_attribute(attribute:"patch_publication_date", value:"2004/08/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/08/30");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Gentoo Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("qpkg.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;

if (qpkg_check(package:"www-apps/horde-imp", unaffected:make_list("ge 3.2.5"), vulnerable:make_list("le 3.2.4"))) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = qpkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Horde-IMP");
}
VendorProductVersionCPE
gentoolinuxhorde-impp-cpe:/a:gentoo:linux:horde-imp
gentoolinuxcpe:/o:gentoo:linux
Related for GENTOO_GLSA-200408-07.NASL