Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59338
Category:Fedora Local Security Checks
Title:Fedora Core 5 FEDORA-2006-788 (squirrelmail)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to squirrelmail
announced via advisory FEDORA-2006-788.

SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in pure PHP support for the IMAP and SMTP protocols, and
all pages render in pure HTML 4.0 (with no Javascript) for maximum
compatibility across browsers. It has very few requirements and is very
easy to configure and install. SquirrelMail has all the functionality
you would want from an email client, including strong MIME support,
address books, and folder manipulation.

Update Information:

Many fixes here. Please report any regressions to Red Hat
Bugzilla.

- 1.4.7 with CVE-2006-3174 (#197369)
- Move sqspell_config.php to /etc and mark it
%%config(noreplace) (#192236)
- Reduce patch for body text (#194457)
- Better JP translation for Check mail (#196117)
- Japanese zenkaku subject conversion (#196017)
- Japanese MSIE garbled download ugly hack (#195639)
- Japanese multibyte attachment view text (#195452)
- Japanese multibyte attachment body text (#194457)
- Do not convert Japanese Help to UTF-8 (#194599)
* Sun Jul 9 2006 Warren Togami 1.4.7-2
- Move sqspell_config.php to /etc and mark it %config(noreplace) (#192236)
* Fri Jul 7 2006 Warren Togami 1.4.7-1
- 1.4.7 with CVE-2006-3174
- Reduce patch for body text (#194457)
- Better JP translation for Check mail (#196117)
* Fri Jun 23 2006 Warren Togami 1.4.6-8
- Japanese zenkaku subject conversion (#196017)
- Japanese MSIE garbled download ugly hack (#195639)
- Japanese multibyte attachment view text (#195452)
- Japanese multibyte attachment body text (#194457)
- Do not convert Japanese Help to UTF-8 (#194599)
* Wed Jun 7 2006 Warren Togami 1.4.6-7
- CVE-2006-2842 File Inclusion Vulnerability
* Mon Jun 5 2006 Warren Togami 1.4.6-6
- buildreq gettext (194169)

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2006-788

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-3174
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
BugTraq ID: 18700
http://www.securityfocus.com/bid/18700
BugTraq ID: 25159
http://www.securityfocus.com/bid/25159
http://www.mandriva.com/security/advisories?name=MDKSA-2006:147
http://pridels0.blogspot.com/2006/06/squirrelmail-151-xss-vuln.html
http://www.osvdb.org/26610
http://secunia.com/advisories/26235
http://www.vupen.com/english/advisories/2007/2732
XForce ISS Database: squirrelmail-search-xss(26941)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26941
Common Vulnerability Exposure (CVE) ID: CVE-2006-2842
BugTraq ID: 18231
http://www.securityfocus.com/bid/18231
Bugtraq: 20060601 Squirrelmail local file inclusion (Google Search)
http://www.securityfocus.com/archive/1/435605/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11670
http://www.redhat.com/support/errata/RHSA-2006-0547.html
http://securitytracker.com/id?1016209
http://secunia.com/advisories/20406
http://secunia.com/advisories/20931
http://secunia.com/advisories/21159
http://secunia.com/advisories/21262
SGI Security Advisory: 20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
SuSE Security Announcement: SUSE-SR:2006:017 (Google Search)
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.vupen.com/english/advisories/2006/2101
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.