Executive Summary
Summary | |
---|---|
Title | New squirrelmail packages fix cross-site scripting |
Informations | |||
---|---|---|---|
Name | DSA-1290 | First vendor Publication | 2007-05-13 |
Vendor | Debian | Last vendor Modification | 2007-05-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that the webmail package Squirrelmail performs insufficient sanitising inside the HTML filter, which allows the injection of arbitrary web script code during the display of HTML email messages. For the oldstable distribution (sarge) this problem has been fixed in version 1.4.4-11. For the stable distribution (etch) this problem has been fixed in version 1.4.9a-2. For the unstable distribution (sid) this problem has been fixed in version 1.4.10a-1. We recommend that you upgrade your squirrelmail package. |
Original Source
Url : http://www.debian.org/security/2007/dsa-1290 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11712 | |||
Oval ID: | oval:org.mitre.oval:def:11712 | ||
Title: | Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer. | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-1262 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17997 | |||
Oval ID: | oval:org.mitre.oval:def:17997 | ||
Title: | DSA-1290-1 squirrelmail | ||
Description: | It was discovered that the webmail package Squirrelmail performs insufficient sanitising inside the HTML filter, which allows the injection of arbitrary web script code during the display of HTML email messages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1290-1 CVE-2007-1262 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | squirrelmail |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-02-27 | Name : Fedora Update for squirrelmail FEDORA-2007-505 File : nvt/gb_fedora_2007_505_squirrelmail_fc6.nasl |
2008-09-04 | Name : FreeBSD Ports: squirrelmail File : nvt/freebsd_squirrelmail4.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1290-1 (squirrelmail) File : nvt/deb_1290_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
35888 | SquirrelMail with MSIE Unspecified Non-ASCII Character Set XSS |
35887 | SquirrelMail HTML E-mail Attachment Data URI XSS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0358.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20070517_squirrelmail_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-3629.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-3944.nasl - Type : ACT_GATHER_INFO |
2007-08-02 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2007-007.nasl - Type : ACT_GATHER_INFO |
2007-05-25 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_0e575ed3076411dca80b0016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0358.nasl - Type : ACT_GATHER_INFO |
2007-05-20 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0358.nasl - Type : ACT_GATHER_INFO |
2007-05-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1290.nasl - Type : ACT_GATHER_INFO |
2007-05-16 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-505.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:37 |
|