|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2007:0022|
|Summary:||Redhat Security Advisory RHSA-2007:0022|
The remote host is missing updates announced in
SquirrelMail is a standards-based webmail package written in PHP.
Several cross-site scripting bugs were discovered in SquirrelMail. An
SquirrelMail pages by tricking a user into visiting a carefully crafted
Users of SquirrelMail should upgrade to this erratum package, which
contains a backported patch to correct these issues.
- - After installing this update, users are advised to restart their
httpd service to ensure that the updated version functions correctly.
- - config.php should NOT be modified, please modify config_local.php instead.
- - Known Bug: The configuration generator may potentially produce bad
options that interfere with the operation of this application. Applying
specific config changes to config_local.php manually is recommended.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2006-6142|
Debian Security Information: DSA-1241 (Google Search)
SGI Security Advisory: 20070201-01-P
SuSE Security Announcement: SUSE-SR:2006:029 (Google Search)
SuSE Security Announcement: SUSE-SR:2007:004 (Google Search)
BugTraq ID: 21414
BugTraq ID: 25159
XForce ISS Database: squirrelmail-mimeheader-xss(30695)
XForce ISS Database: squirrelmail-webmail-compose-xss(30693)
XForce ISS Database: squirrelmail-magichtml-messages-xss(30694)
|Copyright||Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.