Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31741
HistoryFeb 22, 2015 - 12:00 a.m.

[ MDVSA-2015:040 ] zarafa

2015-02-2200:00:00
vulners.com
40

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2015:040
http://www.mandriva.com/en/support/security/


Package : zarafa
Date : February 10, 2015
Affected: Business Server 1.0


Problem Description:

Updated zarafa packages fix security vulnerability:

Robert Scheck discovered a flaw in Zarafa WebAccess >= 7.0.0 and
Zarafa WebApp that could allow a remote unauthenticated attacker to
exhaust the disk space of /tmp (CVE-2014-9465).

This update also adds some patches from Robert Scheck which correct
some packaging issues with zarafa-webaccess.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9465
http://advisories.mageia.org/MGASA-2015-0049.html


Updated Packages:

Mandriva Business Server 1/X86_64:
d02d0aa971a2c9beb08ba13cb301f2fa mbs1/x86_64/lib64zarafa0-7.1.8-1.2.mbs1.x86_64.rpm
7c145a1654a5a3e5750446f5bde487ce mbs1/x86_64/lib64zarafa-devel-7.1.8-1.2.mbs1.x86_64.rpm
10c3a04e8fb13007acac27aae499cc18 mbs1/x86_64/php-mapi-7.1.8-1.2.mbs1.x86_64.rpm
d4da6ee2d2f06358f9b67e53c27524cf mbs1/x86_64/python-MAPI-7.1.8-1.2.mbs1.x86_64.rpm
b06a463514ee33bf4d37e1e7479ca748 mbs1/x86_64/zarafa-7.1.8-1.2.mbs1.x86_64.rpm
4b0a8bf9a24c613cefcf7fd5610752ff mbs1/x86_64/zarafa-archiver-7.1.8-1.2.mbs1.x86_64.rpm
dea3b4b66caca2166561fa050f5fb244 mbs1/x86_64/zarafa-caldav-7.1.8-1.2.mbs1.x86_64.rpm
de149a1fd48201d03ff2f3e0015a83d0 mbs1/x86_64/zarafa-client-7.1.8-1.2.mbs1.x86_64.rpm
0ac2f836530e46e1919dbb90f0701c9e mbs1/x86_64/zarafa-common-7.1.8-1.2.mbs1.x86_64.rpm
8d6951d361fccd3c56cac0acbcbe4c8b mbs1/x86_64/zarafa-dagent-7.1.8-1.2.mbs1.x86_64.rpm
96676de89197b21e00f1c3ae1fe7f4c9 mbs1/x86_64/zarafa-gateway-7.1.8-1.2.mbs1.x86_64.rpm
f7e0752b64296f57ff1a7cf25ba527f9 mbs1/x86_64/zarafa-ical-7.1.8-1.2.mbs1.x86_64.rpm
ff69a904aba0aa7690fd645fea4209ff mbs1/x86_64/zarafa-indexer-7.1.8-1.2.mbs1.x86_64.rpm
466da62fd624f682da8e2bd6d4c38f39 mbs1/x86_64/zarafa-monitor-7.1.8-1.2.mbs1.x86_64.rpm
1c9ea1fa3ba9943ea75faf26f9bd1f3b mbs1/x86_64/zarafa-server-7.1.8-1.2.mbs1.x86_64.rpm
16334cfe056a1f1efa622c3e6be41d5e mbs1/x86_64/zarafa-spooler-7.1.8-1.2.mbs1.x86_64.rpm
027e4549c0405734692872df31ee0f4a mbs1/x86_64/zarafa-utils-7.1.8-1.2.mbs1.x86_64.rpm
9c4a6ca376d462077c6d21d3f3543eff mbs1/x86_64/zarafa-webaccess-7.1.8-1.2.mbs1.noarch.rpm
3362a5851bb152d92e85a5f985dd2103 mbs1/SRPMS/zarafa-7.1.8-1.2.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFU2g92mqjQ0CJFipgRAoQFAJ9oJTTa4Cv8NG4Yvfd2Wgs9qtBCxQCfdTmn
cjn/5HlYotdAIrZtRhLqDcQ=
=5Uns
-----END PGP SIGNATURE-----