First published: Mon Jan 30 2017(Updated: )
Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2181 is considered a critical vulnerability due to the potential for remote code execution through buffer overflows.
To fix CVE-2015-2181, upgrade your Roundcube installation to version 1.1.0 or later, which includes the necessary security patches.
CVE-2015-2181 allows remote attackers to exploit buffer overflows, potentially leading to unauthorized access or control of the affected system.
CVE-2015-2181 affects all Roundcube versions prior to 1.1.0.
CVE-2015-2181 was not initially disclosed as a zero-day vulnerability since it has available patches, but it poses a significant risk until systems are updated.