Executive Summary
Summary | |
---|---|
Title | squirrelmail security update |
Informations | |||
---|---|---|---|
Name | RHSA-2009:1066 | First vendor Publication | 2009-05-26 |
Vendor | RedHat | Last vendor Modification | 2009-05-26 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - noarch Red Hat Desktop version 3 - noarch Red Hat Enterprise Linux ES version 3 - noarch Red Hat Enterprise Linux WS version 3 - noarch Red Hat Enterprise Linux AS version 4 - noarch Red Hat Enterprise Linux Desktop version 4 - noarch Red Hat Enterprise Linux ES version 4 - noarch Red Hat Enterprise Linux WS version 4 - noarch RHEL Desktop Workstation (v. 5 client) - noarch Red Hat Enterprise Linux (v. 5 server) - noarch 3. Description: SquirrelMail is a standards-based webmail package written in PHP. A server-side code injection flaw was found in the SquirrelMail "map_yp_alias" function. If SquirrelMail was configured to retrieve a user's IMAP server address from a Network Information Service (NIS) server via the "map_yp_alias" function, an unauthenticated, remote attacker using a specially-crafted username could use this flaw to execute arbitrary code with the privileges of the web server. (CVE-2009-1579) Multiple cross-site scripting (XSS) flaws were found in SquirrelMail. An attacker could construct a carefully crafted URL, which once visited by an unsuspecting user, could cause the user's web browser to execute malicious script in the context of the visited SquirrelMail web page. (CVE-2009-1578) It was discovered that SquirrelMail did not properly sanitize Cascading Style Sheets (CSS) directives used in HTML mail. A remote attacker could send a specially-crafted email that could place mail content above SquirrelMail's controls, possibly allowing phishing and cross-site scripting attacks. (CVE-2009-1581) Users of squirrelmail should upgrade to this updated package, which contains backported patches to correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 500356 - CVE-2009-1581 SquirrelMail: CSS positioning vulnerability 500360 - CVE-2009-1579 SquirrelMail: Server-side code injection in map_yp_alias username map 500363 - CVE-2009-1578 SquirrelMail: Multiple cross site scripting issues |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2009-1066.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
33 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10441 | |||
Oval ID: | oval:org.mitre.oval:def:10441 | ||
Title: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Description: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1581 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10986 | |||
Oval ID: | oval:org.mitre.oval:def:10986 | ||
Title: | The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. | ||
Description: | The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1579 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11624 | |||
Oval ID: | oval:org.mitre.oval:def:11624 | ||
Title: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING). | ||
Description: | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1578 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22626 | |||
Oval ID: | oval:org.mitre.oval:def:22626 | ||
Title: | ELSA-2009:1066: squirrelmail security update (Important) | ||
Description: | functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1066-01 CVE-2009-1578 CVE-2009-1579 CVE-2009-1581 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29339 | |||
Oval ID: | oval:org.mitre.oval:def:29339 | ||
Title: | RHSA-2009:1066 -- squirrelmail security update (Important) | ||
Description: | An updated squirrelmail package that fixes multiple security issues is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. SquirrelMail is a standards-based webmail package written in PHP. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1066 CESA-2009:1066-CentOS 3 CESA-2009:1066-CentOS 5 CVE-2009-1578 CVE-2009-1579 CVE-2009-1581 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 3 CentOS Linux 5 | Product(s): | squirrelmail |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for squirrelmail CESA-2009:1066 centos5 i386 File : nvt/gb_CESA-2009_1066_squirrelmail_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for squirrelmail CESA-2009:1066 centos3 i386 File : nvt/gb_CESA-2009_1066_squirrelmail_centos3_i386.nasl |
2010-01-20 | Name : Gentoo Security Advisory GLSA 201001-08 (squirrelmail) File : nvt/glsa_201001_08.nasl |
2009-09-02 | Name : Fedora Core 10 FEDORA-2009-8797 (squirrelmail) File : nvt/fcore_2009_8797.nasl |
2009-06-05 | Name : Ubuntu USN-776-2 (kvm) File : nvt/ubuntu_776_2.nasl |
2009-06-05 | Name : RedHat Security Advisory RHSA-2009:1066 File : nvt/RHSA_2009_1066.nasl |
2009-06-05 | Name : CentOS Security Advisory CESA-2009:1066 (squirrelmail) File : nvt/ovcesa2009_1066.nasl |
2009-06-05 | Name : Fedora Core 9 FEDORA-2009-5471 (squirrelmail) File : nvt/fcore_2009_5471.nasl |
2009-06-05 | Name : Fedora Core 10 FEDORA-2009-5350 (squirrelmail) File : nvt/fcore_2009_5350.nasl |
2009-05-25 | Name : Mandrake Security Advisory MDVSA-2009:122 (squirrelmail) File : nvt/mdksa_2009_122.nasl |
2009-05-25 | Name : Debian Security Advisory DSA 1802-2 (squirrelmail) File : nvt/deb_1802_2.nasl |
2009-05-25 | Name : Debian Security Advisory DSA 1802-1 (squirrelmail) File : nvt/deb_1802_1.nasl |
2009-05-20 | Name : Fedora Core 10 FEDORA-2009-4880 (squirrelmail) File : nvt/fcore_2009_4880.nasl |
2009-05-20 | Name : Fedora Core 11 FEDORA-2009-4875 (squirrelmail) File : nvt/fcore_2009_4875.nasl |
2009-05-20 | Name : Fedora Core 9 FEDORA-2009-4870 (squirrelmail) File : nvt/fcore_2009_4870.nasl |
2009-05-20 | Name : Mandrake Security Advisory MDVSA-2009:110 (squirrelmail) File : nvt/mdksa_2009_110.nasl |
2009-05-14 | Name : SquirrelMail Prior to 1.4.18 Multiple Vulnerabilities File : nvt/squirrelmail_1_4_18.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54508 | SquirrelMail E-mail Crafted CSS Positioning XSS |
54506 | SquirrelMail Example map_yp_alias Username Mapping Alias Unspecified Arbitrar... |
54505 | SquirrelMail contrib/decrypt_headers.php Unspecified XSS |
54504 | SquirrelMail Crafted Link Multiple Unspecified XSS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20090526_squirrelmail_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_6_4.nasl - Type : ACT_GATHER_INFO |
2010-06-15 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2010-004.nasl - Type : ACT_GATHER_INFO |
2010-02-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201001-08.nasl - Type : ACT_GATHER_INFO |
2009-05-28 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2009-05-27 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2009-1066.nasl - Type : ACT_GATHER_INFO |
2009-05-26 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5350.nasl - Type : ACT_GATHER_INFO |
2009-05-26 | Name : The remote Fedora host is missing a security update. File : fedora_2009-5471.nasl - Type : ACT_GATHER_INFO |
2009-05-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1802.nasl - Type : ACT_GATHER_INFO |
2009-05-15 | Name : The remote webmail application is affected by a cross-site scripting vulnerab... File : squirrelmail_1418.nasl - Type : ACT_ATTACK |
2009-05-15 | Name : The remote webmail application allows execution of arbitrary code. File : squirrelmail_map_yp_alias_code_exec.nasl - Type : ACT_ATTACK |
2009-05-14 | Name : The remote openSUSE host is missing a security update. File : suse_squirrelmail-6242.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4870.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4875.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-4880.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:52:33 |
|