Roundcube: Arbitrary code execution A vulnerability in Roundcube could potentially lead to arbitrary code execution. roundcube 2016-12-24 2016-12-24 601410 remote 1.2.3 1.2.3

Free and open source webmail software for the masses, written in PHP.

Roundcube, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line.

An authenticated remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition.

Don’t use a MTA (Mail Transfer Agent) in conjunction with Roundcube which implements sendmail’s “-O” or “-X” parameter, or configure Roundcube to use a SMTP server as recommended by upstream.

All Roundcube users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.2.3"
CVE-2016-9920 whissi whissi