Executive Summary
Summary | |
---|---|
Title | New squirrelmail packages fix cross-site scripting |
Informations | |||
---|---|---|---|
Name | DSA-1241 | First vendor Publication | 2006-12-25 |
Vendor | Debian | Last vendor Modification | 2006-12-25 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Martijn Brinkers discovered cross-site scripting vulnerabilities in the the mailto parameter of webmail.php, the session and delete_draft parameters of compose.php and through a shortcoming in the magicHTML filter. An attacker could abuse these to execute malicious JavaScript in the user's webmail session. Also, a workaround was made for Internet Explorer <= 5: IE will attempt to guess the MIME type of attachments based on content, not the MIME header sent. Attachments could fake to be an 'harmless' JPEG, while they were in fact HTML that Internet Explorer would render. For the stable distribution (sarge) these problems have been fixed in version 2:1.4.4-10. For the upcoming stable distribution (etch) these problems have been fixed in version 2:1.4.9a-1. For the unstable distribution (sid) these problems have been fixed in version 2:1.4.9a-1. We recommend that you upgrade your squirrelmail package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1241 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9988 | |||
Oval ID: | oval:org.mitre.oval:def:9988 | ||
Title: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter." | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-6142 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-27 | Name : Fedora Update for squirrelmail FEDORA-2007-088 File : nvt/gb_fedora_2007_088_squirrelmail_fc5.nasl |
2009-02-27 | Name : Fedora Update for squirrelmail FEDORA-2007-089 File : nvt/gb_fedora_2007_089_squirrelmail_fc6.nasl |
2009-02-27 | Name : Fedora Update for squirrelmail FEDORA-2007-505 File : nvt/gb_fedora_2007_505_squirrelmail_fc6.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1241-1 (squirrelmail) File : nvt/deb_1241_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
31722 | SquirrelMail magicHTML Filter Unspecified Issue |
31721 | SquirrelMail compose.php Multiple Parameter XSS |
31720 | SquirrelMail webmail.php mailto Parameter XSS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0022.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-2409.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-2417.nasl - Type : ACT_GATHER_INFO |
2007-08-02 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2007-007.nasl - Type : ACT_GATHER_INFO |
2007-05-16 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-505.nasl - Type : ACT_GATHER_INFO |
2007-02-09 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0022.nasl - Type : ACT_GATHER_INFO |
2007-02-09 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0022.nasl - Type : ACT_GATHER_INFO |
2007-01-18 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-088.nasl - Type : ACT_GATHER_INFO |
2007-01-18 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-089.nasl - Type : ACT_GATHER_INFO |
2006-12-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1241.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:26 |
|