Bug 476830 (CVE-2008-5620)

Summary: CVE-2008-5620 roundcubemail: DoS due insufficient quota image size paramaters checking (use excessive amount of memory)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: gwync
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://sourceforge.net/forum/forum.php?forum_id=898542
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-12-30 17:27:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Upstream patch
none
/bin/html2text.php diff part extracted from upstream patch.
none
/bin/quotaimg.php diff extracted from the upstream patch
none
Downloaded upstream patch. none

Description Jan Lieskovsky 2008-12-17 12:08:43 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5620 to
the following vulnerability:

RoundCube Webmail (roundcubemail) before 0.2-beta allows remote
attackers to cause a denial of service (memory consumption) via
crafted size parameters that are used to create a large quota image.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5620
http://sourceforge.net/forum/forum.php?forum_id=898542

Upstream patch:
http://downloads.sourceforge.net/roundcubemail/roundcubemail-0.2-beta-patch.tar.gz

Comment 1 Jan Lieskovsky 2008-12-17 12:10:34 UTC
Created attachment 327236 [details]
Upstream patch

Comment 2 Jan Lieskovsky 2008-12-17 12:11:29 UTC
This issue affects all versions of the Roundcubemail package, as shipped
with Fedora releases of 9, 10 and devel.

Comment 3 Jan Lieskovsky 2008-12-17 12:16:30 UTC
Created attachment 327238 [details]
/bin/html2text.php diff part extracted from upstream patch.

Comment 4 Jan Lieskovsky 2008-12-17 12:17:55 UTC
Created attachment 327240 [details]
/bin/quotaimg.php diff extracted from the upstream patch

Comment 6 Jan Lieskovsky 2008-12-17 16:40:56 UTC
Created attachment 327267 [details]
Downloaded upstream patch.

Comment 7 Gwyn Ciesla 2008-12-17 16:42:44 UTC
These patches are reflected in the current version, 0.2-beta.  This
vulnerability affects per 0.2-beta releases.

Comment 8 Tomas Hoger 2008-12-17 17:00:53 UTC
Patch in comment #4 does not seem to be, or do I miss anything?

Comment 9 Gwyn Ciesla 2008-12-17 17:19:19 UTC
Whoops, bad patch.  Fixing. . .

Comment 10 Fedora Update System 2008-12-17 21:10:24 UTC
roundcubemail-0.2-5.beta.fc9 has been submitted as an update for Fedora 9.
http://admin.fedoraproject.org/updates/roundcubemail-0.2-5.beta.fc9

Comment 11 Fedora Update System 2008-12-17 21:10:27 UTC
roundcubemail-0.2-5.beta.fc8 has been submitted as an update for Fedora 8.
http://admin.fedoraproject.org/updates/roundcubemail-0.2-5.beta.fc8

Comment 12 Fedora Update System 2008-12-17 21:10:30 UTC
roundcubemail-0.2-5.beta.fc10 has been submitted as an update for Fedora 10.
http://admin.fedoraproject.org/updates/roundcubemail-0.2-5.beta.fc10

Comment 13 Fedora Update System 2008-12-21 08:28:56 UTC
roundcubemail-0.2-5.beta.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 Fedora Update System 2008-12-21 08:31:34 UTC
roundcubemail-0.2-5.beta.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 15 Fedora Update System 2008-12-21 08:34:55 UTC
roundcubemail-0.2-5.beta.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.