IMP 2.2.7 (SECURITY) released

From: Brent J. Nordquist (bjnat_private)
Date: Sat Nov 10 2001 - 07:05:26 PST

  • Next message: Jeffrey W. Dronenburg: "Re: Microsoft IE cookies readable via about: URLS"

    The Horde team announces the availability of IMP 2.2.7, which fixes a
    potential session hijacking vulnerability using a cross-site scripting
    (CSS) attack.  We recommend that all sites running IMP 2.2.x upgrade to
    this version.
    
    The Horde Project would like to thank João Pedro Gonçalves from the
    Phibernet Information Network <megasat_private> for discovering this
    problem and alerting us.  From his description:
    
    > - It's possible to hijack an imp/horde session using a cross-site
    > script attack, quite similar to the one explored by Marc Slemko in his
    > "Microsoft Passport to Trouble" paper.
    > 
    > - After hijacking the cookies, the attacker can use the session and read
    > the victim's mail.
    > 
    > - All stable imp webmail versions, up to 2.2.6 including are vulnerable,
    > the devel version, 2.3 and 3.0 Release Candidate 1 are not affected by
    > this vulnerability.
    
    This release also has a new Chinese (Simplified) translation.
    
    Download:
    
    This release can be downloaded from the following locations:
    
    	ftp://ftp.horde.org/pub/horde/
    	ftp://ftp.horde.org/pub/imp/
    
    MD5 checksums:
    
    2433ed0e67739c41021b1a9397130a96  horde-1.2.7.tar.gz
    b5c683e1dc862fd185c9be0ce7188894  imp-2.2.7.tar.gz
    818199bc9a92cff07d109c4b43a22ffe  patch-horde-1.2.6-1.2.7.gz
    556ddcabc72048ae53f4cfb00680e6f5  patch-imp-2.2.6-2.2.7.gz
    
    -- 
    Brent J. Nordquist <bjnat_private> N0BJN
    Yahoo!: Brent_Nordquist / AIM: BrentJNordquist / ICQ: 76158942
    



    This archive was generated by hypermail 2b30 : Sat Nov 10 2001 - 07:26:42 PST