First published: Sat Jun 25 2016(Updated: )
Cybozu Garoon 3.7 through 4.2 allows remote attackers to obtain sensitive email-reading information via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Garoon | =3.7.0 | |
Cybozu Garoon | =3.7.1 | |
Cybozu Garoon | =3.7.2 | |
Cybozu Garoon | =3.7.3 | |
Cybozu Garoon | =3.7.4 | |
Cybozu Garoon | =3.7.5 | |
Cybozu Garoon | =4.0.0 | |
Cybozu Garoon | =4.0.1 | |
Cybozu Garoon | =4.0.2 | |
Cybozu Garoon | =4.0.3 | |
Cybozu Garoon | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1193 is classified as a medium-severity vulnerability that allows remote attackers access to sensitive email-reading information.
To fix CVE-2016-1193, you should upgrade Cybozu Garoon to a version that is not vulnerable, specifically versions 4.2.0 or later.
CVE-2016-1193 affects Cybozu Garoon versions 3.7.0 to 4.2.0.
Exploitation of CVE-2016-1193 can lead to unauthorized access to sensitive email-reading information.
Currently, there are no recommended workarounds for CVE-2016-1193, so updating is advised.