製品・ソフトウェアに関する情報
Horde の Horde API などにおける脆弱性
Title Horde の Horde API などにおける脆弱性
Summary

Horde の Horde API、Turba H3、Kronolith H3、Nag H3、Mnemo H3、Horde Groupware および Groupware Webmail Edition には、不特定の影響を受ける脆弱性が存在します。

Possible impacts 不特定の影響を受ける可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Sept. 13, 2009, midnight
Registration Date Sept. 25, 2012, 5:27 p.m.
Last Update Sept. 25, 2012, 5:27 p.m.
CVSS2.0 : 危険
Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected System
Horde
Horde 3.1.6 未満の 3.1 および 3.2-RC2 未満の 3.2
Horde Groupware 1.0.3 未満の 1.0 および 1.1-RC2 未満の 1.1
Horde Groupware Webmail Edition 1.0.4 未満の 1.0 および 1.1-RC2 未満の 1.1
Kronolith H3 2.1.7 未満の 2.1 および 2.2-RC2 未満の 2.2
mnemo h3 2.1.2 未満の 2.1 および 2.2-RC2 未満の 2.2
nag h3 2.1.4 未満の 2.1 および 2.2-RC2 未満の 2.2
turba h3 2.1.6 未満の 2.1 および 2.2-RC2 未満の 2.2
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年09月25日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2008-7218
Summary

Unspecified vulnerability in the Horde API in Horde 3.1 before 3.1.6 and 3.2 before 3.2 before 3.2-RC2; Turba H3 2.1 before 2.1.6 and 2.2 before 2.2-RC2; Kronolith H3 2.1 before 2.1.7 and H3 2.2 before 2.2-RC2; Nag H3 2.1 before 2.1.4 and 2.2 before 2.2-RC2; Mnemo H3 2.1 before 2.1.2 and 2.2 before 2.2-RC2; Horde Groupware 1.0 before 1.0.3 and 1.1 before 1.1-RC2; and Groupware Webmail Edition 1.0 before 1.0.4 and 1.1 before 1.1-RC2 has unknown impact and attack vectors.

Publication Date Sept. 14, 2009, 7:30 a.m.
Registration Date Jan. 29, 2021, 1:52 p.m.
Last Update Aug. 17, 2017, 10:29 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:kronolith_h3:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:mnemo_h3:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:mnemo_h3:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:mnemo_h3:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:nag_h3:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:nag_h3:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:nag_h3:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:nag_h3:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:nag_h3:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:turba_h3:2.2:rc1:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List