Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50373
Category:Fedora Local Security Checks
Title:Fedora Core 2 FEDORA-2004-160 (squirrelmail)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to squirrelmail
announced via advisory FEDORA-2004-160.

SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in pure PHP support for the IMAP and SMTP protocols, and
all pages render in pure HTML 4.0 (with no Javascript) for maximum
compatibility across browsers. It has very few requirements and is very
easy to configure and install. SquirrelMail has all the functionality
you would want from an email client, including strong MIME support,
address books, and folder manipulation.

Update Information:

An SQL injection flaw was found in SquirrelMail version 1.4.2 and
earlier. If SquirrelMail is configured to store user addressbooks in
the database, a remote attacker could use this flaw to execute
arbitrary SQL statements. The Common Vulnerabilities and Exposures
project has assigned the name CVE-2004-0521 to this issue.

A number of cross-site scripting (XSS) flaws in SquirrelMail version
1.4.2 and earlier could allow remote attackers to execute scripts as
other web users. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520
to these issues.

This update includes the SquirrelMail version 1.4.3a which is not
vulnerable to these issues.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

1a985829cd9b532953d8235083aa9ff2 SRPMS/squirrelmail-1.4.3-1.src.rpm
b76007bdb6f2a926d46cc6099e66a45d i386/squirrelmail-1.4.3-1.noarch.rpm
b76007bdb6f2a926d46cc6099e66a45d x86_64/squirrelmail-1.4.3-1.noarch.rpm

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-160.shtml

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0521
http://www.securityfocus.com/advisories/7148
BugTraq ID: 10397
http://www.securityfocus.com/bid/10397
Computer Incident Advisory Center Bulletin: O-212
http://www.ciac.org/ciac/bulletins/o-212.shtml
Conectiva Linux advisory: CLA-2004:858
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
Debian Security Information: DSA-535 (Google Search)
http://www.debian.org/security/2004/dsa-535
http://www.securityfocus.com/advisories/6827
https://bugzilla.fedora.us/show_bug.cgi?id=1733
http://security.gentoo.org/glsa/glsa-200405-16.xml
http://marc.info/?l=squirrelmail-cvs&m=108309375029888
http://marc.info/?l=squirrelmail-cvs&m=108532891231712
http://www.osvdb.org/6841
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1033
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11446
RedHat Security Advisories: RHSA-2004:240
http://rhn.redhat.com/errata/RHSA-2004-240.html
http://secunia.com/advisories/11685
http://secunia.com/advisories/11686
http://secunia.com/advisories/11870
http://secunia.com/advisories/12289
SGI Security Advisory: 20040604-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
XForce ISS Database: squirrelmail-sql-injection(16235)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16235
Common Vulnerability Exposure (CVE) ID: CVE-2004-0519
BugTraq ID: 10246
http://www.securityfocus.com/bid/10246
Bugtraq: 20040429 SquirrelMail Cross Scripting Attacks.... (Google Search)
http://marc.info/?l=bugtraq&m=108334862800260
Bugtraq: 20040430 Re: SquirrelMail Cross Scripting Attacks.... (Google Search)
http://www.securityfocus.com/archive/1/361857
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1006
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10274
http://secunia.com/advisories/11531
SuSE Security Announcement: SUSE-SR:2005:019 (Google Search)
http://www.novell.com/linux/security/advisories/2005_19_sr.html
XForce ISS Database: squirrel-composephp-xss(16025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16025
Common Vulnerability Exposure (CVE) ID: CVE-2004-0520
BugTraq ID: 10439
http://www.securityfocus.com/bid/10439
Bugtraq: 20040530 RS-2004-1: SquirrelMail "Content-Type" XSS vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=108611554415078&w=2
http://www.gentoo.org/security/en/glsa/glsa-200406-08.xml
http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10766
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.