[<prev] [next>] [day] [month] [year] [list]
Message-ID: <560BE19C.50901@apache.org>
Date: Wed, 30 Sep 2015 15:20:28 +0200
From: Eric Charles <eric@...che.org>
To: server-user@...es.apache.org, Jakub.Palaczynski@...servicespolska.pl,
server-dev@...es.apache.org, security@...che.org,
oss-security@...ts.openwall.com, bugtraq@...urityfocus.com, cert@...t.org
Subject: Apache James Server 2.3.2 security vulnerability fixed
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected: James Server 2.3.2
Description: Apache James Server 2.3.2 has security issue that can let a
user execute arbitrary system command for servers configured with file
based user repositories.
Mitigation: 2.3.2 users should upgrade to 2.3.2.1 to be downloaded from
http://james.apache.org/download.cgi#Apache_James_Server
Credit: This issue was discovered by Palaczynski Jakub
<Jakub.Palaczynski@...servicespolska.pl> (recorded as VU#988628 by CERT)
Powered by blists - more mailing lists