Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-7414
HistoryApr 04, 2017 - 12:00 a.m.

CVE-2017-7414

2017-04-0400:00:00
ubuntu.com
ubuntu.com
9

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.4%

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x
through 5.2.17, OS Command Injection can occur if the user has PGP features
enabled in the user’s preferences, and has enabled the “Should PGP signed
messages be automatically verified when viewed?” preference. To exploit
this vulnerability, an attacker can send a PGP signed email (that is
maliciously crafted) to the Horde user, who then must either view or
preview it.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchphp-horde-crypt< anyUNKNOWN

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

55.4%