Antwort: Openwebmail 1.71 remote root compromise

2002-12-23 Thread Stephan Sachweh
On 18.12.2002 18:37:59 Dmitry Guyvoronsky wrote: > Software : Openwebmail (http://openwebmail.org) > Version : ?.?? -> 1.71 (current) > Type : Arbitrary commands execution > Remote : yes > Root : yes (!!!) > Date : December 18, 2002 > IV. RECOMENDATIONS > > Temporary disable usi

[Fix] Openwebmail 1.71 remote root compromise

2002-12-19 Thread Dmitry Guyvoronsky
Hello Vendor of the OpenWebMail system had released patch and upgraded `current` sources. More information can be found at: http://sourceforge.net/forum/forum.php?thread_id=782605&forum_id=108435 Patches: http://openwebmail.org/openwebmail/download/cert/patches/SA-02:01/ Current: http://op

Openwebmail 1.71 remote root compromise

2002-12-19 Thread Dmitry Guyvoronsky
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Security Advisory 12.18.02 Software : Openwebmail (http://openwebmail.org) Version : ?.?? -> 1.71 (current) Type : Arbitrary commands execution Remote : yes Root : yes (!!!) Date : December 18, 2002 I. BACKGROUND Openwebmail is a web-