First published: Tue Mar 13 2018(Updated: )
roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/roundcube | 1.3.17+dfsg.1-1~deb10u2 1.3.17+dfsg.1-1~deb10u3 1.4.14+dfsg.1-1~deb11u1 1.4.13+dfsg.1-1~deb11u1 1.6.3+dfsg-1~deb12u1 1.6.4+dfsg-1 | |
Roundcube Webmail | <=1.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000071 is a vulnerability found in roundcube version 1.3.4 and earlier that allows for the exfiltration of gpg private keys.
The severity of CVE-2018-1000071 is high, with a severity value of 7.5.
CVE-2018-1000071 can be exploited through network connectivity.
roundcube versions 1.3.4 and earlier are affected by CVE-2018-1000071.
To fix CVE-2018-1000071, update roundcube to version 1.3.17+dfsg.1-1~deb10u2, 1.3.17+dfsg.1-1~deb10u3, 1.4.14+dfsg.1-1~deb11u1, 1.4.13+dfsg.1-1~deb11u1, 1.6.3+dfsg-1~deb12u1, or 1.6.4+dfsg-1, depending on your Debian version.