Vulnerability Description
Calacode @Mail 5.41 on Linux uses weak world-readable permissions for (1) webmail/libs/Atmail/Config.php and (2) webmail/webadmin/.htpasswd, which allows local users to obtain sensitive information by reading these files. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | All versions |
| Calacode | Atmail | 5.41 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31279Vendor Advisory
- http://www.securityfocus.com/bid/30434
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44144
- http://secunia.com/advisories/31279Vendor Advisory
- http://www.securityfocus.com/bid/30434
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44144
FAQ
What is CVE-2008-3395?
CVE-2008-3395 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Calacode @Mail 5.41 on Linux uses weak world-readable permissions for (1) webmail/libs/Atmail/Config.php and (2) webmail/webadmin/.htpasswd, which allows local users to obtain sensitive information by...
How severe is CVE-2008-3395?
CVE-2008-3395 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3395?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Calacode Atmail.