Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50327
Category:Fedora Local Security Checks
Title:Fedora Core 1 FEDORA-2004-159 (squirrelmail)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to squirrelmail
announced via advisory FEDORA-2004-159.

SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in pure PHP support for the IMAP and SMTP protocols, and
all pages render in pure HTML 4.0 (with no Javascript) for maximum
compatibility across browsers. It has very few requirements and is very
easy to configure and install. SquirrelMail has all the functionality
you would want from an email client, including strong MIME support,
address books, and folder manipulation.

Update Information:

An SQL injection flaw was found in SquirrelMail version 1.4.2 and
earlier. If SquirrelMail is configured to store user addressbooks in
the database, a remote attacker could use this flaw to execute
arbitrary SQL statements. The Common Vulnerabilities and Exposures
project has assigned the name CVE-2004-0521 to this issue.

A number of cross-site scripting (XSS) flaws in SquirrelMail version
1.4.2 and earlier could allow remote attackers to execute scripts as
other web users. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520
to these issues.

This update includes the SquirrelMail version 1.4.3a which is not
vulnerable to these issues.

* Mon Jun 07 2004 Gary Benson 1.4.3-0.f1.1

- upgrade to 1.4.3a.
- retain stuff after version when adding release to it.

* Wed Jun 02 2004 Gary Benson

- upgrade to 1.4.3.

* Fri Feb 13 2004 Elliot Lee

- rebuilt.

* Wed Jan 21 2004 Gary Benson 1.4.2-2

- fix calendar plugin breakage (#113902).

* Thu Jan 08 2004 Gary Benson 1.4.2-1

- upgrade to 1.4.2.
- tighten up permissions on /etc/squirrelmail/config.php (#112774).

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

be17fbe0ab2c017c9f8aafc407c3fb68 SRPMS/squirrelmail-1.4.3-0.f1.1.src.rpm
4c8288b42458e69e656230afd2a4a38f i386/squirrelmail-1.4.3-0.f1.1.noarch.rpm
4c8288b42458e69e656230afd2a4a38f x86_64/squirrelmail-1.4.3-0.f1.1.noarch.rpm

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-159.shtml

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0521
http://www.securityfocus.com/advisories/7148
BugTraq ID: 10397
http://www.securityfocus.com/bid/10397
Computer Incident Advisory Center Bulletin: O-212
http://www.ciac.org/ciac/bulletins/o-212.shtml
Conectiva Linux advisory: CLA-2004:858
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
Debian Security Information: DSA-535 (Google Search)
http://www.debian.org/security/2004/dsa-535
http://www.securityfocus.com/advisories/6827
https://bugzilla.fedora.us/show_bug.cgi?id=1733
http://security.gentoo.org/glsa/glsa-200405-16.xml
http://marc.info/?l=squirrelmail-cvs&m=108309375029888
http://marc.info/?l=squirrelmail-cvs&m=108532891231712
http://www.osvdb.org/6841
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1033
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11446
RedHat Security Advisories: RHSA-2004:240
http://rhn.redhat.com/errata/RHSA-2004-240.html
http://secunia.com/advisories/11685
http://secunia.com/advisories/11686
http://secunia.com/advisories/11870
http://secunia.com/advisories/12289
SGI Security Advisory: 20040604-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
XForce ISS Database: squirrelmail-sql-injection(16235)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16235
Common Vulnerability Exposure (CVE) ID: CVE-2004-0519
BugTraq ID: 10246
http://www.securityfocus.com/bid/10246
Bugtraq: 20040429 SquirrelMail Cross Scripting Attacks.... (Google Search)
http://marc.info/?l=bugtraq&m=108334862800260
Bugtraq: 20040430 Re: SquirrelMail Cross Scripting Attacks.... (Google Search)
http://www.securityfocus.com/archive/1/361857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274
http://secunia.com/advisories/11531
SuSE Security Announcement: SUSE-SR:2005:019 (Google Search)
http://www.novell.com/linux/security/advisories/2005_19_sr.html
XForce ISS Database: squirrel-composephp-xss(16025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16025
Common Vulnerability Exposure (CVE) ID: CVE-2004-0520
BugTraq ID: 10439
http://www.securityfocus.com/bid/10439
Bugtraq: 20040530 RS-2004-1: SquirrelMail "Content-Type" XSS vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=108611554415078&w=2
http://www.gentoo.org/security/en/glsa/glsa-200406-08.xml
http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10766
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.