|
Message-Id: <20151001121751.548F66C0670@smtpvmsrv1.mitre.org> Date: Thu, 1 Oct 2015 08:17:51 -0400 (EDT) From: cve-assign@...re.org To: eric@...che.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, Jakub.Palaczynski@...servicespolska.pl, security@...che.org, cert@...t.org Subject: Re: Apache James Server 2.3.2 security vulnerability fixed VU#988628 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > Description: Apache James Server 2.3.2 has security issue that can let a > user execute arbitrary system command for servers configured with file > based user repositories. > > Mitigation: 2.3.2 users should upgrade to 2.3.2.1 to be downloaded from > http://james.apache.org/download.cgi#Apache_James_Server > > Credit: This issue was discovered by Palaczynski Jakub > <Jakub.Palaczynski@...servicespolska.pl> (recorded as VU#988628 by CERT) Use CVE-2015-7611. (The MITRE CVE team has had earlier communication with the discoverer, and learned that step 8 of the http://www.apache.org/security/committers.html process wasn't completed in this case.) - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWDSLlAAoJEL54rhJi8gl5Z4MP/0qtNB4vq72DmYEHNKScQYFc fojNnegH/3uH8V6Mj8f3NZw/87SkZCfcryIK9PcFcJDFwHwnJAIjfixFySSacvri x5JjIMhYKNWFV5wAbSN1cWmKMEehhhtHT3TRSyR10gsu+wmJZgQDM5RhTb90QCQt SkFHWbrNckvgiuOtTNflhX9D3Nkv7yy8KmzNfD1QAhtKHjy4DWw+zKje5MIj5a70 BZdwPkufTB2AvL6iYMsF3UMCuzRYNIp3Oa3EXdPonf20V/kvJINX5pURLh0UAawG Y85mNhmen0UnQyAnMxw+ewWzAJ2NwqIfS6CiV3nDCDeZ5XqXwYi86RR+U/rOjf1C 3RXOq8jfAc/0HgaZ2vIw7BE8Gx7Co8mYh+zbw+DWiSGUhxwAsKwTM7W+jdtqyW2+ iGrsrFbwxQVTxK4iU4BmW2uzFnbDVHIogJHVrC0lr2g7miWOGmQwclBzoRRP2X1M xfrEc80u9gQuSssv97Dr8ykmCPHOuxfuZPxA6xhj519DqpDQgVcNMZDa7qJzJvgj 2L6LkEptqK3nYm4IKE1QwxzszTtY6A5f/H71v3qs9JCzWhEVLK8YYu5Svjdtz9o9 f4/WFgUu4mRaQDrvHVEwz0fXOChTvwILTEIZyK8lqZ0LIhvrT1kaoMyjsSzkdRlk PbH4QryaY29jRJbRTzys =hNER -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.