DSA-1519-1 horde3 -- insufficient input sanitising

Related Vulnerabilities: CVE-2008-1284  

It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter. For the old stable distribution (sarge) this problem has been fixed in version 3.0.4-4sarge7. For the stable distribution (etch) this problem has been fixed in version 3.1.3-4etch3. For the unstable distribution (sid) this problem has been fixed in version 3.1.7-1. We recommend that you upgrade your horde3 package.

Debian Security Advisory

DSA-1519-1 horde3 -- insufficient input sanitising

Date Reported:
15 Mar 2008
Affected Packages:
horde3
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 470640.
In Mitre's CVE dictionary: CVE-2008-1284.
More information:

It was discovered that the Horde web application framework permits arbitrary file inclusion by a remote attacker through the theme preference parameter.

For the old stable distribution (sarge) this problem has been fixed in version 3.0.4-4sarge7.

For the stable distribution (etch) this problem has been fixed in version 3.1.3-4etch4.

For the unstable distribution (sid) this problem has been fixed in version 3.1.7-1.

We recommend that you upgrade your horde3 package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.dsc
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4.orig.tar.gz
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7.diff.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge7_all.deb

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4.diff.gz
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4.dsc
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch4_all.deb

MD5 checksums of the listed files are available in the original advisory.