Apache James Server 2.3.2 security vulnerability fixed

From: Eric Charles <eric@apache.org>
To: server-user@james.apache.org,Jakub.Palaczynski@ingservicespolska.pl,server-dev@james.apache.org,security@apache.org,oss-security@lists.openwall.com,bugtraq@securityfocus.com,cert@cert.org
Cc:
Subject: Apache James Server 2.3.2 security vulnerability fixed
Date:


Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: James Server 2.3.2

Description: Apache James Server 2.3.2 has security issue that can let a 
user execute arbitrary system command for servers configured with file 
based user repositories.

Mitigation: 2.3.2 users should upgrade to 2.3.2.1 to be downloaded from 
http://james.apache.org/download.cgi#Apache_James_Server

Credit: This issue was discovered by ´╗┐Palaczynski Jakub 
<Jakub.Palaczynski@ingservicespolska.pl> (recorded as VU#988628 by CERT)





Copyright ┬ę 1995-2018 LinuxRocket.net. All rights reserved.