Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title squirrelmail security update
Informations
Name RHSA-2009:1066 First vendor Publication 2009-05-26
Vendor RedHat Last vendor Modification 2009-05-26
Severity (Vendor) Important Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - noarch Red Hat Desktop version 3 - noarch Red Hat Enterprise Linux ES version 3 - noarch Red Hat Enterprise Linux WS version 3 - noarch Red Hat Enterprise Linux AS version 4 - noarch Red Hat Enterprise Linux Desktop version 4 - noarch Red Hat Enterprise Linux ES version 4 - noarch Red Hat Enterprise Linux WS version 4 - noarch RHEL Desktop Workstation (v. 5 client) - noarch Red Hat Enterprise Linux (v. 5 server) - noarch

3. Description:

SquirrelMail is a standards-based webmail package written in PHP.

A server-side code injection flaw was found in the SquirrelMail "map_yp_alias" function. If SquirrelMail was configured to retrieve a user's IMAP server address from a Network Information Service (NIS) server via the "map_yp_alias" function, an unauthenticated, remote attacker using a specially-crafted username could use this flaw to execute arbitrary code with the privileges of the web server. (CVE-2009-1579)

Multiple cross-site scripting (XSS) flaws were found in SquirrelMail. An attacker could construct a carefully crafted URL, which once visited by an unsuspecting user, could cause the user's web browser to execute malicious script in the context of the visited SquirrelMail web page. (CVE-2009-1578)

It was discovered that SquirrelMail did not properly sanitize Cascading Style Sheets (CSS) directives used in HTML mail. A remote attacker could send a specially-crafted email that could place mail content above SquirrelMail's controls, possibly allowing phishing and cross-site scripting attacks. (CVE-2009-1581)

Users of squirrelmail should upgrade to this updated package, which contains backported patches to correct these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

500356 - CVE-2009-1581 SquirrelMail: CSS positioning vulnerability 500360 - CVE-2009-1579 SquirrelMail: Server-side code injection in map_yp_alias username map 500363 - CVE-2009-1578 SquirrelMail: Multiple cross site scripting issues

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2009-1066.html

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)
33 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10441
 
Oval ID: oval:org.mitre.oval:def:10441
Title: functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
Description: functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
Family: unix Class: vulnerability
Reference(s): CVE-2009-1581
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10986
 
Oval ID: oval:org.mitre.oval:def:10986
Title: The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
Description: The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
Family: unix Class: vulnerability
Reference(s): CVE-2009-1579
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11624
 
Oval ID: oval:org.mitre.oval:def:11624
Title: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
Description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
Family: unix Class: vulnerability
Reference(s): CVE-2009-1578
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22626
 
Oval ID: oval:org.mitre.oval:def:22626
Title: ELSA-2009:1066: squirrelmail security update (Important)
Description: functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
Family: unix Class: patch
Reference(s): ELSA-2009:1066-01
CVE-2009-1578
CVE-2009-1579
CVE-2009-1581
Version: 17
Platform(s): Oracle Linux 5
Product(s): squirrelmail
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29339
 
Oval ID: oval:org.mitre.oval:def:29339
Title: RHSA-2009:1066 -- squirrelmail security update (Important)
Description: An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is a standards-based webmail package written in PHP.
Family: unix Class: patch
Reference(s): RHSA-2009:1066
CESA-2009:1066-CentOS 3
CESA-2009:1066-CentOS 5
CVE-2009-1578
CVE-2009-1579
CVE-2009-1581
Version: 3
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 3
CentOS Linux 5
Product(s): squirrelmail
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 101

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for squirrelmail CESA-2009:1066 centos5 i386
File : nvt/gb_CESA-2009_1066_squirrelmail_centos5_i386.nasl
2011-08-09 Name : CentOS Update for squirrelmail CESA-2009:1066 centos3 i386
File : nvt/gb_CESA-2009_1066_squirrelmail_centos3_i386.nasl
2010-01-20 Name : Gentoo Security Advisory GLSA 201001-08 (squirrelmail)
File : nvt/glsa_201001_08.nasl
2009-09-02 Name : Fedora Core 10 FEDORA-2009-8797 (squirrelmail)
File : nvt/fcore_2009_8797.nasl
2009-06-05 Name : Ubuntu USN-776-2 (kvm)
File : nvt/ubuntu_776_2.nasl
2009-06-05 Name : RedHat Security Advisory RHSA-2009:1066
File : nvt/RHSA_2009_1066.nasl
2009-06-05 Name : CentOS Security Advisory CESA-2009:1066 (squirrelmail)
File : nvt/ovcesa2009_1066.nasl
2009-06-05 Name : Fedora Core 9 FEDORA-2009-5471 (squirrelmail)
File : nvt/fcore_2009_5471.nasl
2009-06-05 Name : Fedora Core 10 FEDORA-2009-5350 (squirrelmail)
File : nvt/fcore_2009_5350.nasl
2009-05-25 Name : Mandrake Security Advisory MDVSA-2009:122 (squirrelmail)
File : nvt/mdksa_2009_122.nasl
2009-05-25 Name : Debian Security Advisory DSA 1802-2 (squirrelmail)
File : nvt/deb_1802_2.nasl
2009-05-25 Name : Debian Security Advisory DSA 1802-1 (squirrelmail)
File : nvt/deb_1802_1.nasl
2009-05-20 Name : Fedora Core 10 FEDORA-2009-4880 (squirrelmail)
File : nvt/fcore_2009_4880.nasl
2009-05-20 Name : Fedora Core 11 FEDORA-2009-4875 (squirrelmail)
File : nvt/fcore_2009_4875.nasl
2009-05-20 Name : Fedora Core 9 FEDORA-2009-4870 (squirrelmail)
File : nvt/fcore_2009_4870.nasl
2009-05-20 Name : Mandrake Security Advisory MDVSA-2009:110 (squirrelmail)
File : nvt/mdksa_2009_110.nasl
2009-05-14 Name : SquirrelMail Prior to 1.4.18 Multiple Vulnerabilities
File : nvt/squirrelmail_1_4_18.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
54508 SquirrelMail E-mail Crafted CSS Positioning XSS

54506 SquirrelMail Example map_yp_alias Username Mapping Alias Unspecified Arbitrar...

54505 SquirrelMail contrib/decrypt_headers.php Unspecified XSS

54504 SquirrelMail Crafted Link Multiple Unspecified XSS

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2009-1066.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20090526_squirrelmail_on_SL3_x.nasl - Type : ACT_GATHER_INFO
2010-06-15 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_6_4.nasl - Type : ACT_GATHER_INFO
2010-06-15 Name : The remote host is missing a Mac OS X update that fixes a security issue.
File : macosx_SecUpd2010-004.nasl - Type : ACT_GATHER_INFO
2010-02-25 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201001-08.nasl - Type : ACT_GATHER_INFO
2009-05-28 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO
2009-05-27 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO
2009-05-26 Name : The remote Fedora host is missing a security update.
File : fedora_2009-5350.nasl - Type : ACT_GATHER_INFO
2009-05-26 Name : The remote Fedora host is missing a security update.
File : fedora_2009-5471.nasl - Type : ACT_GATHER_INFO
2009-05-20 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1802.nasl - Type : ACT_GATHER_INFO
2009-05-15 Name : The remote webmail application is affected by a cross-site scripting vulnerab...
File : squirrelmail_1418.nasl - Type : ACT_ATTACK
2009-05-15 Name : The remote webmail application allows execution of arbitrary code.
File : squirrelmail_map_yp_alias_code_exec.nasl - Type : ACT_ATTACK
2009-05-14 Name : The remote openSUSE host is missing a security update.
File : suse_squirrelmail-6242.nasl - Type : ACT_GATHER_INFO
2009-05-13 Name : The remote Fedora host is missing a security update.
File : fedora_2009-4870.nasl - Type : ACT_GATHER_INFO
2009-05-13 Name : The remote Fedora host is missing a security update.
File : fedora_2009-4875.nasl - Type : ACT_GATHER_INFO
2009-05-13 Name : The remote Fedora host is missing a security update.
File : fedora_2009-4880.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:52:33
  • Multiple Updates