Description: | Description:
The remote host is missing updates announced in advisory RHSA-2005:135.
SquirrelMail is a standards-based webmail package written in PHP4.
Jimmy Conner discovered a missing variable initialization in Squirrelmail. This flaw could allow potential insecure file inclusions on servers where the PHP setting register_globals is set to On. This is not a default or recommended setting. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0075 to this issue.
A URL sanitisation bug was found in Squirrelmail. This flaw could allow a cross site scripting attack when loading the URL for the sidebar. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0103 to this issue.
A missing variable initialization bug was found in Squirrelmail. This flaw could allow a cross site scripting attack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0104 to this issue.
Users of Squirrelmail are advised to upgrade to this updated package, which contains backported patches to correct these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2005-135.html http://www.squirrelmail.org/security/issue/2005-01-20 http://www.squirrelmail.org/security/issue/2005-01-19 http://www.squirrelmail.org/security/issue/2005-01-14 http://www.php.net/register_globals http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0104
Risk factor : High
CVSS Score: 7.5
|