Package: imp4
Severity: important
Tags: security

It has been discovered that an Internet Explorer specific interpretation
flaw can be abused to bypass the sanitising features of IMP. Please see
http://article.gmane.org/gmane.comp.security.bugtraq/20693
for more information.

In a followup on of the upstream authors indicated that they're working
on revamping their security strategy from a black list approach (filtering
out harmful content) towards a mechanism that only permits non-harmful
HTML content, as they're unwilling to fix the IE interpretation bug of the
day.

This has been assigned CVE-2005-4080, please mention it in the changelog
when fixing this.

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to