[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Apache James Server 2.3.2 security vulnerability fixed
- To: server-user@xxxxxxxxxxxxxxxx, Jakub.Palaczynski@xxxxxxxxxxxxxxxxxxxx, server-dev@xxxxxxxxxxxxxxxx, security@xxxxxxxxxx, oss-security@xxxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx, cert@xxxxxxxx
- Subject: Apache James Server 2.3.2 security vulnerability fixed
- From: Eric Charles <eric@xxxxxxxxxx>
- Date: Wed, 30 Sep 2015 15:20:28 +0200
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected: James Server 2.3.2
Description: Apache James Server 2.3.2 has security issue that can let a
user execute arbitrary system command for servers configured with file
based user repositories.
Mitigation: 2.3.2 users should upgrade to 2.3.2.1 to be downloaded from
http://james.apache.org/download.cgi#Apache_James_Server
Credit: This issue was discovered by Palaczynski Jakub
<Jakub.Palaczynski@xxxxxxxxxxxxxxxxxxxx> (recorded as VU#988628 by CERT)