First published: Mon Sep 08 2014(Updated: )
I discovered a flaw in Zarafa WebAccess >= 7.0.0 and Zarafa WebApp (any version) that could allow a remote unauthenticated attacker to exhaust the disk space of /tmp. Depending on the setup /tmp might be on / (e.g. RHEL). Zarafa WebApp is a fork and the successor of the Zarafa WebAccess. The affected files are /usr/share/zarafa-webaccess/senddocument.php as well as /usr/share/zarafa-webapp/senddocument.php. The default upload size is 30 MB (via /etc/httpd/conf.d/zarafa-webaccess.conf / zarafa-webapp.conf). I do not know if $tmpname is predictable (for race conditions) but likely not. The 2nd parameter is only a prefix according to the PHP documentation of tempnam(). From my point of view the file "senddocument.php" is neither referenced nor used anywhere in the code and could be simply removed. Upstream has been notified and I am awaiting their response. At the moment this RHBZ is only meant to have this tracked somewhere, please do not yet disclose.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/zarafa-7.1.12 | <1 | 1 |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 | |
Zarafa WebApp | <=2.0 | |
Zarafa Collaboration Platform | =7.0.0 | |
Zarafa Collaboration Platform | =7.0.1 | |
Zarafa Collaboration Platform | =7.0.2 | |
Zarafa Collaboration Platform | =7.0.3 | |
Zarafa Collaboration Platform | =7.0.4 | |
Zarafa Collaboration Platform | =7.0.5 | |
Zarafa Collaboration Platform | =7.0.6 | |
Zarafa Collaboration Platform | =7.0.7 | |
Zarafa Collaboration Platform | =7.0.8 | |
Zarafa Collaboration Platform | =7.0.9 | |
Zarafa Collaboration Platform | =7.0.10 | |
Zarafa Collaboration Platform | =7.0.11 | |
Zarafa Collaboration Platform | =7.0.12 | |
Zarafa Collaboration Platform | =7.0.13 | |
Zarafa Collaboration Platform | =7.1.0 | |
Zarafa Collaboration Platform | =7.1.1 | |
Zarafa Collaboration Platform | =7.1.2 | |
Zarafa Collaboration Platform | =7.1.3 | |
Zarafa Collaboration Platform | =7.1.4 | |
Zarafa Collaboration Platform | =7.1.5 | |
Zarafa Collaboration Platform | =7.1.6 | |
Zarafa Collaboration Platform | =7.1.7 | |
Zarafa Collaboration Platform | =7.1.8 | |
Zarafa Collaboration Platform | =7.1.9 | |
Zarafa Collaboration Platform | =7.1.10 | |
Zarafa Collaboration Platform | =7.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9465 is classified as a medium severity vulnerability that can lead to denial of service through disk space exhaustion.
To fix CVE-2014-9465, you should update Zarafa WebAccess or Zarafa WebApp to the latest version that addresses this vulnerability.
CVE-2014-9465 affects users running Zarafa WebAccess versions greater than 7.0.0 and any versions of Zarafa WebApp.
Yes, CVE-2014-9465 can be exploited remotely by unauthenticated attackers to exhaust disk space.
Systems where the /tmp directory is on the root filesystem, such as RHEL, are at higher risk from CVE-2014-9465.