First published: Wed Dec 17 2008(Updated: )
RoundCube Webmail (roundcubemail) before 0.2-beta allows remote attackers to cause a denial of service (memory consumption) via crafted size parameters that are used to create a large quota image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | =0.1-rc1 | |
Roundcube Webmail | =0.1-20050820 | |
Roundcube Webmail | =0.1-20051007 | |
Roundcube Webmail | =0.1 | |
Roundcube Webmail | =0.1-beta2 | |
Roundcube Webmail | =0.1-beta | |
Roundcube Webmail | =0.1-20050811 | |
Roundcube Webmail | =0.1-rc2 | |
Roundcube Webmail | =0.1-stable | |
Roundcube Webmail | =0.1-20051021 | |
Roundcube Webmail | =0.1.1 | |
Roundcube Webmail | =0.1-alpha | |
Roundcube Webmail | =0.2 | |
Roundcube Webmail | <=0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5620 is considered a denial of service vulnerability that can significantly impact the availability of RoundCube Webmail.
To fix CVE-2008-5620, upgrade to RoundCube Webmail version 0.2-beta or later, which contains the necessary patches.
CVE-2008-5620 affects all versions of RoundCube Webmail before 0.2-beta.
CVE-2008-5620 can be exploited by remote attackers using crafted size parameters, leading to memory consumption and potential denial of service.
While CVE-2008-5620 may not be classified as critical, it poses a risk to service availability, making it important to address.