CVE-2011-4078
03.11.2011, 15:55
include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP 5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET request for an arbitrary URL, and cause a denial of service (resource consumption and inbox outage), via a Subject header containing only a URL, a related issue to CVE-2011-3379.Enginsight
Vendor | Product | Version |
---|---|---|
roundcube | webmail | 𝑥 ≤ 0.5.4 |
roundcube | webmail | 0.1 |
roundcube | webmail | 0.1:alpha |
roundcube | webmail | 0.1:beta |
roundcube | webmail | 0.1:beta2 |
roundcube | webmail | 0.1:rc1 |
roundcube | webmail | 0.1:rc2 |
roundcube | webmail | 0.1.1 |
roundcube | webmail | 0.2 |
roundcube | webmail | 0.2:alpha |
roundcube | webmail | 0.2:beta |
roundcube | webmail | 0.2.1 |
roundcube | webmail | 0.3 |
roundcube | webmail | 0.3:beta |
roundcube | webmail | 0.3:rc1 |
roundcube | webmail | 0.3.1 |
roundcube | webmail | 0.4 |
roundcube | webmail | 0.4:beta |
roundcube | webmail | 0.4.1 |
roundcube | webmail | 0.4.2 |
roundcube | webmail | 0.5 |
roundcube | webmail | 0.5:beta |
roundcube | webmail | 0.5:rc |
roundcube | webmail | 0.5.1 |
roundcube | webmail | 0.5.2 |
roundcube | webmail | 0.5.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
roundcube |
|
Common Weakness Enumeration
References