Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870880
Category:Red Hat Local Security Checks
Title:RedHat Update for squirrelmail RHSA-2013:0126-01
Summary:The remote host is missing an update for the 'squirrelmail'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'squirrelmail'
package(s) announced via the referenced advisory.

Vulnerability Insight:
SquirrelMail is a standards-based webmail package written in PHP.

The SquirrelMail security update RHSA-2012:0103 did not, unlike the erratum
text stated, correct the CVE-2010-2813 issue, a flaw in the way
SquirrelMail handled failed log in attempts. A user preference file was
created when attempting to log in with a password containing an 8-bit
character, even if the username was not valid. A remote attacker could use
this flaw to eventually consume all hard disk space on the target
SquirrelMail server. (CVE-2012-2124)

This update also fixes the following bugs:

* Prior to this update, SquirrelMail could not decode multi-line subjects
properly. Consequently, the decode header internationalization option did
not properly handle new lines or tabs at the beginning of the lines. This
bug has been fixed and SquirrelMail now works correctly in the described
scenario. (BZ#241861)

* Due to a bug, attachments written in HTML code on the Windows operating
system were not displayed properly when accessed with SquirrelMail. The
'!=null' string was trimmed to '!ull'. This bug has been fixed and the
attachments are now displayed correctly in such a case. (BZ#359791)

* Previously, e-mail messages with a Unique Identifier (UID) larger than
2^31 bytes were unreadable when using the squirrelmail package. With this
patch the squirrelmail package is able to read all messages regardless of
the UIDs size. (BZ#450780)

* Due to a bug, a PHP script did not assign the proper character set to
requested variables. Consequently, SquirrelMail could not display any
e-mails. The underlying source code has been modified and now the
squirrelmail package assigns the correct character set. (BZ#475188)

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
squirrelmail on Red Hat Enterprise Linux (v. 5 server)

Solution:
Please Install the Updated Packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-2124
http://www.openwall.com/lists/oss-security/2012/04/20/22
RedHat Security Advisories: RHSA-2013:0126
http://rhn.redhat.com/errata/RHSA-2013-0126.html
http://secunia.com/advisories/51730
Common Vulnerability Exposure (CVE) ID: CVE-2010-2813
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
BugTraq ID: 42399
http://www.securityfocus.com/bid/42399
Debian Security Information: DSA-2091 (Google Search)
http://www.debian.org/security/2010/dsa-2091
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045372.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045383.html
RedHat Security Advisories: RHSA-2012:0103
http://rhn.redhat.com/errata/RHSA-2012-0103.html
http://secunia.com/advisories/40964
http://secunia.com/advisories/40971
http://www.vupen.com/english/advisories/2010/2070
http://www.vupen.com/english/advisories/2010/2080
XForce ISS Database: squirrelmail-imap-dos(61124)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61124
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.