An improper input validation was found in the way Horde used to render certain MIME fields. A remote attacker could provide a specially-crafted MIME field content, leading to cross-site scripting (XSS), once rendered by a local, valid Horde user. References: ----------- http://bugs.horde.org/ticket/?id=8311 http://marc.info/?l=horde-announce&m=125291625030436&w=2 http://secunia.com/advisories/36665/2/ http://bugs.gentoo.org/show_bug.cgi?id=285052 Upstream patch: --------------- http://ftp.horde.org/pub/horde/patches/patch-horde-3.2.4-3.2.5.gz CVE request: ------------ http://www.openwall.com/lists/oss-security/2009/09/15/4 http://www.openwall.com/lists/oss-security/2009/09/15/5
This issue affects the versions of the Horde package, as shipped with Fedora releases of 10 and 11, and as shipped within EPEL-5 project.
*** This bug has been marked as a duplicate of bug 523407 ***