|Main Archive Page > Month Archives > full-disclosure-uk archives|
Multiple vulnerabilities were found in SquirrelMail of which the worst results in remote code execution.
SquirrelMail is a standards-based webmail package written in PHP.
Multiple vulnerabilities were found in SquirrelMail:
The vulnerabilities allow remote attackers to execute arbitrary code with the privileges of the user running the web server, to hijack web sessions via a crafted cookie, to spoof the user interface and to conduct Cross-Site Scripting and phishing attacks, via a specially crafted message.
There is no known workaround at this time.
All SquirrelMail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.19"
[ 1 ] CVE-2009-1381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1381 [ 2 ] CVE-2009-1578
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1578 [ 3 ] CVE-2009-1579
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1579 [ 4 ] CVE-2009-1580
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1580 [ 5 ] CVE-2009-1581
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to firstname.lastname@example.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.