Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2009:110 | First vendor Publication | 2009-05-12 |
Vendor | Mandriva | Last vendor Modification | 2009-05-12 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities has been identified and corrected in squirrelmail: Two issues were fixed that both allowed an attacker to run arbitrary script (XSS) on most any SquirrelMail page by getting the user to click on specially crafted SquirrelMail links (CVE-2009-1578). An issue was fixed wherein input to the contrib/decrypt_headers.php script was not sanitized and allowed arbitrary script execution upon submission of certain values (CVE-2009-1578). An issue was fixed that allowed arbitrary server-side code execution when SquirrelMail was configured to use the example map_yp_alias username mapping functionality (CVE-2009-1579). An issue was fixed that allowed an attacker to possibly steal user data by hijacking the SquirrelMail login session. (CVE-2009-1580). An issue was fixed that allowed phishing and cross-site scripting (XSS) attacks to be run by surreptitious placement of content in specially-crafted emails sent to SquirrelMail users (CVE-2009-1581). Additionally many of the bundled plugins has been upgraded. Basically this is a syncronization with the latest squirrelmail package found in Mandriva Cooker. The rpm changelog will reveal all the changes (rpm -q --changelog squirrelmail). The updated packages have been upgraded to the latest version of squirrelmail to prevent this. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2009:110 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
25 % | CWE-287 | Improper Authentication |
25 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10107 | |||
Oval ID: | oval:org.mitre.oval:def:10107 | ||
Title: | Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie. | ||
Description: | Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1580 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10441 | |||
Oval ID: | oval:org.mitre.oval:def:10441 | ||
Title: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Description: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1581 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10986 | |||
Oval ID: | oval:org.mitre.oval:def:10986 | ||
Title: | The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. | ||
Description: | The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1579 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11624 | |||
Oval ID: | oval:org.mitre.oval:def:11624 | ||
Title: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING). | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1578 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22626 | |||
Oval ID: | oval:org.mitre.oval:def:22626 | ||
Title: | ELSA-2009:1066: squirrelmail security update (Important) | ||
Description: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1066-01 CVE-2009-1578 CVE-2009-1579 CVE-2009-1581 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22665 | |||
Oval ID: | oval:org.mitre.oval:def:22665 | ||
Title: | ELSA-2009:0057: squirrelmail security update (Important) | ||
Description: | Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:0057-01 CVE-2009-0030 CVE-2009-1580 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29213 | |||
Oval ID: | oval:org.mitre.oval:def:29213 | ||
Title: | RHSA-2009:0057 -- squirrelmail security update (Important) | ||
Description: | An updated squirrelmail package that fixes a security issue is now available for Red Hat Enterprise Linux 3, 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is an easy-to-configure, standards-based, webmail package written in PHP. It includes built-in PHP support for the IMAP and SMTP protocols, and pure HTML 4.0 page-rendering (with no JavaScript required) for maximum browser-compatibility, strong MIME support, address books, and folder manipulation. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:0057 CESA-2009:0057-CentOS 3 CESA-2009:0057-CentOS 5 CVE-2009-0030 CVE-2009-1580 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 3 CentOS Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:29339 | |||
Oval ID: | oval:org.mitre.oval:def:29339 | ||
Title: | RHSA-2009:1066 -- squirrelmail security update (Important) | ||
Description: | An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is a standards-based webmail package written in PHP. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1066 CESA-2009:1066-CentOS 3 CESA-2009:1066-CentOS 5 CVE-2009-1578 CVE-2009-1579 CVE-2009-1581 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 3 CentOS Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for squirrelmail CESA-2009:1066 centos5 i386 File : nvt/gb_CESA-2009_1066_squirrelmail_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for squirrelmail CESA-2009:1066 centos3 i386 File : nvt/gb_CESA-2009_1066_squirrelmail_centos3_i386.nasl |
2010-01-20 | Name : Gentoo Security Advisory GLSA 201001-08 (squirrelmail) File : nvt/glsa_201001_08.nasl |
2009-09-02 | Name : Fedora Core 10 FEDORA-2009-8797 (squirrelmail) File : nvt/fcore_2009_8797.nasl |
2009-06-05 | Name : Ubuntu USN-776-2 (kvm) File : nvt/ubuntu_776_2.nasl |
2009-06-05 | Name : RedHat Security Advisory RHSA-2009:1066 File : nvt/RHSA_2009_1066.nasl |
2009-06-05 | Name : CentOS Security Advisory CESA-2009:1066 (squirrelmail) File : nvt/ovcesa2009_1066.nasl |
2009-06-05 | Name : Fedora Core 9 FEDORA-2009-5471 (squirrelmail) File : nvt/fcore_2009_5471.nasl |
2009-06-05 | Name : Fedora Core 10 FEDORA-2009-5350 (squirrelmail) File : nvt/fcore_2009_5350.nasl |
2009-05-25 | Name : Mandrake Security Advisory MDVSA-2009:122 (squirrelmail) File : nvt/mdksa_2009_122.nasl |
2009-05-25 | Name : Debian Security Advisory DSA 1802-2 (squirrelmail) File : nvt/deb_1802_2.nasl |
2009-05-25 | Name : Debian Security Advisory DSA 1802-1 (squirrelmail) File : nvt/deb_1802_1.nasl |
2009-05-20 | Name : Fedora Core 10 FEDORA-2009-4880 (squirrelmail) File : nvt/fcore_2009_4880.nasl |
2009-05-20 | Name : Fedora Core 11 FEDORA-2009-4875 (squirrelmail) File : nvt/fcore_2009_4875.nasl |
2009-05-20 | Name : Fedora Core 9 FEDORA-2009-4870 (squirrelmail) File : nvt/fcore_2009_4870.nasl |
2009-05-20 | Name : Mandrake Security Advisory MDVSA-2009:110 (squirrelmail) File : nvt/mdksa_2009_110.nasl |
2009-05-14 | Name : SquirrelMail Prior to 1.4.18 Multiple Vulnerabilities File : nvt/squirrelmail_1_4_18.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54508 | SquirrelMail E-mail Crafted CSS Positioning XSS |
54507 | SquirrelMail Login Function Unspecified Session Fixation |
54506 | SquirrelMail Example map_yp_alias Username Mapping Alias Unspecified Arbitrar... |
54505 | SquirrelMail contrib/decrypt_headers.php Unspecified XSS |
54504 | SquirrelMail Crafted Link Multiple Unspecified XSS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2009-0057.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20090526_squirrelmail_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2010-004.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_4.nasl - Type : ACT_GATHER_INFO |
2010-02-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201001-08.nasl - Type : ACT_GATHER_INFO |
2009-05-28 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2009-05-27 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2009-05-26 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5471.nasl - Type : ACT_GATHER_INFO |
2009-05-26 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5350.nasl - Type : ACT_GATHER_INFO |
2009-05-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1802.nasl - Type : ACT_GATHER_INFO |
2009-05-15 | Name : The remote webmail application is affected by a cross-site scripting vulnerab... File : squirrelmail_1418.nasl - Type : ACT_ATTACK |
2009-05-15 | Name : The remote webmail application allows execution of arbitrary code. File : squirrelmail_map_yp_alias_code_exec.nasl - Type : ACT_ATTACK |
2009-05-14 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-6242.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4880.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4875.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4870.nasl - Type : ACT_GATHER_INFO |
2009-01-20 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2009-0057.nasl - Type : ACT_GATHER_INFO |
2009-01-20 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2009-0057.nasl - Type : ACT_GATHER_INFO |