|Category:||Mandrake Local Security Checks|
|Title:||Mandriva Security Advisory MDVSA-2010:158 (squirrelmail)|
|Summary:||Mandriva Security Advisory MDVSA-2010:158 (squirrelmail)|
The remote host is missing an update to squirrelmail
announced via advisory MDVSA-2010:158.
A vulnerability has been found and corrected in squirrelmail:
functions/imap_general.php in SquirrelMail before 1.4.21 does not
properly handle 8-bit characters in passwords, which allows remote
attackers to cause a denial of service (disk consumption) by making
many IMAP login attempts with different usernames, leading to the
creation of many preferences files (CVE-2010-2813).
This update provides squirrelmail 1.4.21, which is not vulnerable to
Affected: Corporate 4.0, Enterprise Server 5.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : Medium
Common Vulnerability Exposure (CVE) ID: CVE-2010-2813|
Debian Security Information: DSA-2091 (Google Search)
RedHat Security Advisories: RHSA-2012:0103
BugTraq ID: 42399
XForce ISS Database: squirrelmail-imap-dos(61124)
|Copyright||Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.