Vulnerabilities > CVE-2014-9465 - Resource Management Errors vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
senddocument.php in Zarafa WebApp before 2.0 beta 3 and WebAccess in Zarafa Collaboration Platform (ZCP) 7.x before 7.1.12 beta 1 and 7.2.x before 7.2.0 beta 1 allows remote attackers to cause a denial of service (/tmp disk consumption) by uploading a large number of files.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2015-040.NASL description Updated zarafa packages fix security vulnerability : Robert Scheck discovered a flaw in Zarafa WebAccess >= 7.0.0 and Zarafa WebApp that could allow a remote unauthenticated attacker to exhaust the disk space of /tmp (CVE-2014-9465). This update also adds some patches from Robert Scheck which correct some packaging issues with zarafa-webaccess. last seen 2020-06-01 modified 2020-06-02 plugin id 81281 published 2015-02-11 reporter This script is Copyright (C) 2015-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81281 title Mandriva Linux Security Advisory : zarafa (MDVSA-2015:040) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2015:040. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(81281); script_version("1.3"); script_cvs_date("Date: 2019/08/02 13:32:56"); script_cve_id("CVE-2014-9465"); script_bugtraq_id(71863); script_xref(name:"MDVSA", value:"2015:040"); script_name(english:"Mandriva Linux Security Advisory : zarafa (MDVSA-2015:040)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Updated zarafa packages fix security vulnerability : Robert Scheck discovered a flaw in Zarafa WebAccess >= 7.0.0 and Zarafa WebApp that could allow a remote unauthenticated attacker to exhaust the disk space of /tmp (CVE-2014-9465). This update also adds some patches from Robert Scheck which correct some packaging issues with zarafa-webaccess." ); script_set_attribute( attribute:"see_also", value:"http://advisories.mageia.org/MGASA-2015-0049.html" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64zarafa-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64zarafa0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:php-mapi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-MAPI"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-archiver"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-caldav"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-dagent"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-gateway"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-ical"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-indexer"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-monitor"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-server"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-spooler"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-utils"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:zarafa-webaccess"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1"); script_set_attribute(attribute:"patch_publication_date", value:"2015/02/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/02/11"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64zarafa-devel-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64zarafa0-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"php-mapi-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-MAPI-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-archiver-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-caldav-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-client-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-common-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-dagent-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-gateway-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-ical-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-indexer-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-monitor-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-server-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-spooler-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"zarafa-utils-7.1.8-1.2.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", reference:"zarafa-webaccess-7.1.8-1.2.mbs1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Fedora Local Security Checks NASL id FEDORA_2015-5823.NASL description Zarafa Collaboration Platform 7.1.12 final [48726] ================================================== - ZCP-10149: Include Documentation hint for usage of NFS and -o nolock option - ZCP-10233: Zarafa-mr-accept script complains in certain cases about php timezone functions - ZCP-10578: missing prerequisites for the reverse proxy in the administrator manual - ZCP-10639: Incorrect message when trying to add an archive - ZCP-10919: a remote admin in multi tenant mode cannot resolve users - ZCP-11061: Bandwidth requirement documentation - ZCP-11413: Monitor complains on unused config options. - ZCP-11418: Compat features do not work with outlook 2010 and windows 8 - ZCP-11468: Document for a user who wants to use webapp, but is experiencing problems by using an unsupported browser, an easier area to locate the list of supported browsers - ZCP-11664: Remove last seen 2020-06-05 modified 2015-04-28 plugin id 83089 published 2015-04-28 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83089 title Fedora 21 : zarafa-7.1.12-1.fc21 (2015-5823) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2015-5823. # include("compat.inc"); if (description) { script_id(83089); script_version("2.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2014-9465"); script_xref(name:"FEDORA", value:"2015-5823"); script_name(english:"Fedora 21 : zarafa-7.1.12-1.fc21 (2015-5823)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Zarafa Collaboration Platform 7.1.12 final [48726] ================================================== - ZCP-10149: Include Documentation hint for usage of NFS and -o nolock option - ZCP-10233: Zarafa-mr-accept script complains in certain cases about php timezone functions - ZCP-10578: missing prerequisites for the reverse proxy in the administrator manual - ZCP-10639: Incorrect message when trying to add an archive - ZCP-10919: a remote admin in multi tenant mode cannot resolve users - ZCP-11061: Bandwidth requirement documentation - ZCP-11413: Monitor complains on unused config options. - ZCP-11418: Compat features do not work with outlook 2010 and windows 8 - ZCP-11468: Document for a user who wants to use webapp, but is experiencing problems by using an unsupported browser, an easier area to locate the list of supported browsers - ZCP-11664: Remove 'you' wording from the WebApp User Manual - ZCP-11713: Japanese e-mail breaks the body text - ZCP-11744: zarafa-restore error in documentation - ZCP-11786: zarafa-ws is trying to put files in /usr/share/doc/zarafa - ZCP-11869: Documentation is not clear about Multitenant Public Folder attribute - ZCP-11929: differences between 'Managing tenant (company) spaces' and zarafa-admin - ZCP-11931: Outlook Client: synchronisation of an offline profile makes zarafa-server unresponsive - ZCP-11937: Setting out of office for the first time sets language to Catalan - ZCP-11949: Update documentation to stress that one server must have one database. - ZCP-12081: AB Provider UID is defined multiple times and may cause the server to read invalid memory - ZCP-12110: Segfault zarafa-server 7.1.8 R1 - ZCP-12257: include location of the ads plugin in the manual - ZCP-12371: Add additional LDAP logging when using extended log level - ZCP-12409: zarafa-search crashes with ssl - ZCP-12424: Dagent in LMTP mode violates RFC5321 - ZCP-12461: ECDatabaseMySQL defined twice - ZCP-12488: storing attachments in files on disk is not optimal implemented - ZCP-12491: Last date of a serial MR is ignored - ZCP-12492: Private mails sent from Exchange are not marked private. - ZCP-12501: Component documentation - ZCP-12534: Sending a mail to a group: The receivers do not see the group correctly. - ZCP-12549: remove mail subject from spooler.log - ZCP-12550: Zarafa-hidden does not work for cached outlook in ZCP 7.1.10 - ZCP-12566: gsoap code gets our license attached in community distribution of zcp - ZCP-12568: ldap_uri slows down webapp and server after switching the LDAP-Server - ZCP-12574: meeting request copy to delegate - german umlauts broken - ZCP-12592: Update unsecure swfupload.swf - ZCP-12596: senddocument.php allows unauthorized upload of files - ZCP-12597: OL2013 15.0.4641.1001 shows private appointments - ZCP-12600: Sync seems to fail for larger objects - ZCP-12608: Compatibility package does not install correctly with OEM version of Outlook 2013 in every case - ZCP-12611: Cannot move appointment to different calendar - ZCP-12618: Move temporary patch definitions file to systemwide central location - ZCP-12629: zarafa-server binary does not check for existence of sockets and pids when started manually - ZCP-12657: Optimization of dagent incoming e-mail processing - ZCP-12660: Change runlevel of zarafa-licensed to start before zarafa-server - ZCP-12671: Add new OL2013 version 15.0.4659.1000 client to compatibility component - ZCP-12676: IMAP Failed to read line: Interrupted system call - ZCP-12692: Stores should not be orphaned when user_safe_mode is active, even if they are back when correcting backend - ZCP-12696: SMTP RFC store violation - ZCP-12698: compile fail with recent g++ (4.9) - ZCP-12716: mails send with x-mailer 'CDO for windows 2000' loses attachments. - ZCP-12720: SMTP RFC store violation - ZCP-12754: Document that its a bad idea to switch the connection type inside a profile - ZCP-12755: Add new OL2013 version 15.0.4667.1000 client to compatibility component - ZCP-12762: remove userquota_soft_template & userquota_hard_template from documentation - ZCP-12766: zarafa-mailbox-permissions doesn't remove rules for --remove-all-permissions - ZCP-12788: Updating the name of a non-active user will change it to a active user - ZCP-12790: Message with attachments converted from uuencoded to attachments with uudecode.py - ZCP-12791: zarafa-server crashing due to ldap.cfg error - ZCP-12801: Attachments aren't written into the database - ZCP-12824: zarafa server still logs indexer instead of search. - ZCP-12845: storing attachments in files on disk is not optimal implemented - ZCP-12847: Change changelog author for debian/rhel packages - ZCP-12850: ECDatabaseMySQL defined twice - ZCP-12851: zarafa-gateway: NOOP returns with wrong return code - ZCP-12852: Reading an encypted or signed email will change the receive date of the email to server time - ZCP-12865: zarafa-gateway.cfg man page missing description of imap_max_fail_commands. - ZCP-12877: meeting request copy to delegate - german umlauts broken - ZCP-12889: Segfault zarafa-server 7.1.8 R1 - ZCP-12892: Last date of a serial MR is ignored - ZCP-12898: zarafa-webaccess no login after update to 7.1.10 on Ubuntu 10.04 - ZCP-12901: mails send with x-mailer 'CDO for windows 2000' loses attachments. - ZCP-12908: zarafa-server crashing due to ldap.cfg error - ZCP-12910: Monitor complains on unused config options. - ZCP-12914: Add comment in monitor.cfg for companyquota_warning_template - ZCP-12918: zarafa spooler queues mails forever if smtpd rejects the mail - ZCP-12920: As a user I want to be able to sort the global addresses book by Chinese character - ZCP-12921: Chinese character broken once received - ZCP-12922: remove userquota_soft_template & userquota_hard_template from documentation - ZCP-12923: Building from source fails when xmlto / libical / bison is missing - ZCP-12926: ECChannel::HrSelect doesn't handle EINTR as it should - ZCP-12930: zarafa-dagent segfault when deliver special mail - ZCP-12934: When reporting this traceback, please include Linux distribution name, system architecture and Zarafa version. - ZCP-12944: another chinese decode issue - ZCP-12945: Add new OL2013 version 15.0.4675.1003 client to compatibility component - ZCP-12949: Update documentation for unsupported Oracle Packages - ZCP-12950: zarafa-dagent segfault when deliver special mail - ZCP-12968: ECChannel::HrSelect doesn't handle EINTR as it should - ZCP-12994: Disabling imap on a pop3 users breaks certain mail. - ZCP-12995: Example command given in 'Out of office management' is incomplete - ZCP-13015: add SSL settings for zcp 7.1 - ZCP-13019: Update documentation for Debian language pack installation - ZCP-13020: zarafa-admin tool mismatch password gives wrong notification - ZCP-13024: allowed to create SYSTEM user - ZCP-13026: Add new OL2013 version 15.0.4693.1000 client to compatibility component - ZCP-13030: Add new OL2010 version 14.0.7143.5000 client to compatibility component - ZCP-13035: Rather use SSLCERT_FILE & SSLCERT_PASS when setting up SSO for WebApp/WebAccess - ZCP-13039: Add comment in monitor.cfg for companyquota_warning_template - ZCP-13046: Improve z-push documentation in admin manual - ZCP-13047: man page zarafa-admin --hook-store --copyto-public could use some extra information - ZCP-13055: Zarafa outlook client 7.1.11-48011 does not work well with zarafa auto updater - ZCP-13060: zarafa server still logs indexer instead of search. - ZCP-13061: Sync seems to fail for larger objects - ZCP-13062: Merge the compatibility package installation into the MSI typical install mode - ZCP-13082: patch: wrong charset in HTML - ZCP-13120: Add new OL2013 version 15.0.4701.1000 client to compatibility component - ZCP-13123: Simplification of installation targets of compat package for manifest and c2r installations - ZCP-13143: Spooler.log gives wrong messages notifications - ZCP-13153: Outlook: answering on a message in 'send items' results in a message with empty Reply-To: header. - ZCP-13154: it would be helpful if phpmapi would produce a logfile - ZCP-13155: WebAccess /etc/zarafa/webaccess/config.php is not a symlink - ZCP-13158: Upgrade OpenSSL to 1.0.1m on Win32 - ZCP-13176: zarafa-server binary does not check for existence of sockets and pids when started manually - ZCP-13177: patch: wrong charset in HTML - ZCP-13179: it would be helpful if phpmapi would produce a logfile - ZCP-13180: Spooler.log gives wrong messages notifications - ZCP-13187: Message with attachments converted from uuencoded to attachments with uudecode.py - ZCP-13190: Setting out of office for the first time sets language to Catalan - ZCP-13191: When reporting this traceback, please include Linux distribution name, system architecture and Zarafa version. - ZCP-13192: Incorrect message when trying to add an archive - ZCP-13194: remove mail subject from spooler.log - ZCP-6294: allowed to create SYSTEM user - ZCP-6443: zarafa-admin tool mismatch password gives wrong notification - ZCP-7085: Updating the name of a non-active user will change it to an active user - ZCP-7296: Extension on the administrator manual Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1139442" ); # https://lists.fedoraproject.org/pipermail/package-announce/2015-April/156112.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?f0bb8e2a" ); script_set_attribute( attribute:"solution", value:"Update the affected zarafa package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:zarafa"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:21"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/02/19"); script_set_attribute(attribute:"patch_publication_date", value:"2015/04/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/28"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^21([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 21.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC21", reference:"zarafa-7.1.12-1.fc21")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "zarafa"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2015-5864.NASL description Zarafa Collaboration Platform 7.1.12 final [48726] ================================================== - ZCP-10149: Include Documentation hint for usage of NFS and -o nolock option - ZCP-10233: Zarafa-mr-accept script complains in certain cases about php timezone functions - ZCP-10578: missing prerequisites for the reverse proxy in the administrator manual - ZCP-10639: Incorrect message when trying to add an archive - ZCP-10919: a remote admin in multi tenant mode cannot resolve users - ZCP-11061: Bandwidth requirement documentation - ZCP-11413: Monitor complains on unused config options. - ZCP-11418: Compat features do not work with outlook 2010 and windows 8 - ZCP-11468: Document for a user who wants to use webapp, but is experiencing problems by using an unsupported browser, an easier area to locate the list of supported browsers - ZCP-11664: Remove last seen 2020-06-05 modified 2015-04-28 plugin id 83090 published 2015-04-28 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/83090 title Fedora 20 : zarafa-7.1.12-1.fc20 (2015-5864) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2015-5864. # include("compat.inc"); if (description) { script_id(83090); script_version("2.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2014-9465"); script_xref(name:"FEDORA", value:"2015-5864"); script_name(english:"Fedora 20 : zarafa-7.1.12-1.fc20 (2015-5864)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Zarafa Collaboration Platform 7.1.12 final [48726] ================================================== - ZCP-10149: Include Documentation hint for usage of NFS and -o nolock option - ZCP-10233: Zarafa-mr-accept script complains in certain cases about php timezone functions - ZCP-10578: missing prerequisites for the reverse proxy in the administrator manual - ZCP-10639: Incorrect message when trying to add an archive - ZCP-10919: a remote admin in multi tenant mode cannot resolve users - ZCP-11061: Bandwidth requirement documentation - ZCP-11413: Monitor complains on unused config options. - ZCP-11418: Compat features do not work with outlook 2010 and windows 8 - ZCP-11468: Document for a user who wants to use webapp, but is experiencing problems by using an unsupported browser, an easier area to locate the list of supported browsers - ZCP-11664: Remove 'you' wording from the WebApp User Manual - ZCP-11713: Japanese e-mail breaks the body text - ZCP-11744: zarafa-restore error in documentation - ZCP-11786: zarafa-ws is trying to put files in /usr/share/doc/zarafa - ZCP-11869: Documentation is not clear about Multitenant Public Folder attribute - ZCP-11929: differences between 'Managing tenant (company) spaces' and zarafa-admin - ZCP-11931: Outlook Client: synchronisation of an offline profile makes zarafa-server unresponsive - ZCP-11937: Setting out of office for the first time sets language to Catalan - ZCP-11949: Update documentation to stress that one server must have one database. - ZCP-12081: AB Provider UID is defined multiple times and may cause the server to read invalid memory - ZCP-12110: Segfault zarafa-server 7.1.8 R1 - ZCP-12257: include location of the ads plugin in the manual - ZCP-12371: Add additional LDAP logging when using extended log level - ZCP-12409: zarafa-search crashes with ssl - ZCP-12424: Dagent in LMTP mode violates RFC5321 - ZCP-12461: ECDatabaseMySQL defined twice - ZCP-12488: storing attachments in files on disk is not optimal implemented - ZCP-12491: Last date of a serial MR is ignored - ZCP-12492: Private mails sent from Exchange are not marked private. - ZCP-12501: Component documentation - ZCP-12534: Sending a mail to a group: The receivers do not see the group correctly. - ZCP-12549: remove mail subject from spooler.log - ZCP-12550: Zarafa-hidden does not work for cached outlook in ZCP 7.1.10 - ZCP-12566: gsoap code gets our license attached in community distribution of zcp - ZCP-12568: ldap_uri slows down webapp and server after switching the LDAP-Server - ZCP-12574: meeting request copy to delegate - german umlauts broken - ZCP-12592: Update unsecure swfupload.swf - ZCP-12596: senddocument.php allows unauthorized upload of files - ZCP-12597: OL2013 15.0.4641.1001 shows private appointments - ZCP-12600: Sync seems to fail for larger objects - ZCP-12608: Compatibility package does not install correctly with OEM version of Outlook 2013 in every case - ZCP-12611: Cannot move appointment to different calendar - ZCP-12618: Move temporary patch definitions file to systemwide central location - ZCP-12629: zarafa-server binary does not check for existence of sockets and pids when started manually - ZCP-12657: Optimization of dagent incoming e-mail processing - ZCP-12660: Change runlevel of zarafa-licensed to start before zarafa-server - ZCP-12671: Add new OL2013 version 15.0.4659.1000 client to compatibility component - ZCP-12676: IMAP Failed to read line: Interrupted system call - ZCP-12692: Stores should not be orphaned when user_safe_mode is active, even if they are back when correcting backend - ZCP-12696: SMTP RFC store violation - ZCP-12698: compile fail with recent g++ (4.9) - ZCP-12716: mails send with x-mailer 'CDO for windows 2000' loses attachments. - ZCP-12720: SMTP RFC store violation - ZCP-12754: Document that its a bad idea to switch the connection type inside a profile - ZCP-12755: Add new OL2013 version 15.0.4667.1000 client to compatibility component - ZCP-12762: remove userquota_soft_template & userquota_hard_template from documentation - ZCP-12766: zarafa-mailbox-permissions doesn't remove rules for --remove-all-permissions - ZCP-12788: Updating the name of a non-active user will change it to a active user - ZCP-12790: Message with attachments converted from uuencoded to attachments with uudecode.py - ZCP-12791: zarafa-server crashing due to ldap.cfg error - ZCP-12801: Attachments aren't written into the database - ZCP-12824: zarafa server still logs indexer instead of search. - ZCP-12845: storing attachments in files on disk is not optimal implemented - ZCP-12847: Change changelog author for debian/rhel packages - ZCP-12850: ECDatabaseMySQL defined twice - ZCP-12851: zarafa-gateway: NOOP returns with wrong return code - ZCP-12852: Reading an encypted or signed email will change the receive date of the email to server time - ZCP-12865: zarafa-gateway.cfg man page missing description of imap_max_fail_commands. - ZCP-12877: meeting request copy to delegate - german umlauts broken - ZCP-12889: Segfault zarafa-server 7.1.8 R1 - ZCP-12892: Last date of a serial MR is ignored - ZCP-12898: zarafa-webaccess no login after update to 7.1.10 on Ubuntu 10.04 - ZCP-12901: mails send with x-mailer 'CDO for windows 2000' loses attachments. - ZCP-12908: zarafa-server crashing due to ldap.cfg error - ZCP-12910: Monitor complains on unused config options. - ZCP-12914: Add comment in monitor.cfg for companyquota_warning_template - ZCP-12918: zarafa spooler queues mails forever if smtpd rejects the mail - ZCP-12920: As a user I want to be able to sort the global addresses book by Chinese character - ZCP-12921: Chinese character broken once received - ZCP-12922: remove userquota_soft_template & userquota_hard_template from documentation - ZCP-12923: Building from source fails when xmlto / libical / bison is missing - ZCP-12926: ECChannel::HrSelect doesn't handle EINTR as it should - ZCP-12930: zarafa-dagent segfault when deliver special mail - ZCP-12934: When reporting this traceback, please include Linux distribution name, system architecture and Zarafa version. - ZCP-12944: another chinese decode issue - ZCP-12945: Add new OL2013 version 15.0.4675.1003 client to compatibility component - ZCP-12949: Update documentation for unsupported Oracle Packages - ZCP-12950: zarafa-dagent segfault when deliver special mail - ZCP-12968: ECChannel::HrSelect doesn't handle EINTR as it should - ZCP-12994: Disabling imap on a pop3 users breaks certain mail. - ZCP-12995: Example command given in 'Out of office management' is incomplete - ZCP-13015: add SSL settings for zcp 7.1 - ZCP-13019: Update documentation for Debian language pack installation - ZCP-13020: zarafa-admin tool mismatch password gives wrong notification - ZCP-13024: allowed to create SYSTEM user - ZCP-13026: Add new OL2013 version 15.0.4693.1000 client to compatibility component - ZCP-13030: Add new OL2010 version 14.0.7143.5000 client to compatibility component - ZCP-13035: Rather use SSLCERT_FILE & SSLCERT_PASS when setting up SSO for WebApp/WebAccess - ZCP-13039: Add comment in monitor.cfg for companyquota_warning_template - ZCP-13046: Improve z-push documentation in admin manual - ZCP-13047: man page zarafa-admin --hook-store --copyto-public could use some extra information - ZCP-13055: Zarafa outlook client 7.1.11-48011 does not work well with zarafa auto updater - ZCP-13060: zarafa server still logs indexer instead of search. - ZCP-13061: Sync seems to fail for larger objects - ZCP-13062: Merge the compatibility package installation into the MSI typical install mode - ZCP-13082: patch: wrong charset in HTML - ZCP-13120: Add new OL2013 version 15.0.4701.1000 client to compatibility component - ZCP-13123: Simplification of installation targets of compat package for manifest and c2r installations - ZCP-13143: Spooler.log gives wrong messages notifications - ZCP-13153: Outlook: answering on a message in 'send items' results in a message with empty Reply-To: header. - ZCP-13154: it would be helpful if phpmapi would produce a logfile - ZCP-13155: WebAccess /etc/zarafa/webaccess/config.php is not a symlink - ZCP-13158: Upgrade OpenSSL to 1.0.1m on Win32 - ZCP-13176: zarafa-server binary does not check for existence of sockets and pids when started manually - ZCP-13177: patch: wrong charset in HTML - ZCP-13179: it would be helpful if phpmapi would produce a logfile - ZCP-13180: Spooler.log gives wrong messages notifications - ZCP-13187: Message with attachments converted from uuencoded to attachments with uudecode.py - ZCP-13190: Setting out of office for the first time sets language to Catalan - ZCP-13191: When reporting this traceback, please include Linux distribution name, system architecture and Zarafa version. - ZCP-13192: Incorrect message when trying to add an archive - ZCP-13194: remove mail subject from spooler.log - ZCP-6294: allowed to create SYSTEM user - ZCP-6443: zarafa-admin tool mismatch password gives wrong notification - ZCP-7085: Updating the name of a non-active user will change it to an active user - ZCP-7296: Extension on the administrator manual Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1139442" ); # https://lists.fedoraproject.org/pipermail/package-announce/2015-April/156228.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?5b9639da" ); script_set_attribute( attribute:"solution", value:"Update the affected zarafa package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:zarafa"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/02/19"); script_set_attribute(attribute:"patch_publication_date", value:"2015/04/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/28"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC20", reference:"zarafa-7.1.12-1.fc20")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "zarafa"); }
References
- http://advisories.mageia.org/MGASA-2015-0049.html
- http://download.zarafa.com/community/beta/7.1/changelog-7.1.txt
- http://download.zarafa.com/community/beta/7.2/changelog-7.2.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156112.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156228.html
- http://security.robert-scheck.de/cve-2014-9465-zarafa/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:040
- http://www.openwall.com/lists/oss-security/2014/12/07/2
- http://www.openwall.com/lists/oss-security/2015/01/03/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1139442
- https://jira.zarafa.com/browse/ZCP-12596