Rapid7 Vulnerability & Exploit Database

RHSA-2009:1066: squirrelmail security update

Back to Search

RHSA-2009:1066: squirrelmail security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
05/14/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

SquirrelMail is a standards-based webmail package written in PHP.A server-side code injection flaw was found in the SquirrelMail"map_yp_alias" function. If SquirrelMail was configured to retrieve auser's IMAP server address from a Network Information Service (NIS) servervia the "map_yp_alias" function, an unauthenticated, remote attacker usinga specially-crafted username could use this flaw to execute arbitrary codewith the privileges of the web server. (CVE-2009-1579)Multiple cross-site scripting (XSS) flaws were found in SquirrelMail. Anattacker could construct a carefully crafted URL, which once visited by an unsuspecting user, could cause the user's web browser to execute maliciousscript in the context of the visited SquirrelMail web page. (CVE-2009-1578)It was discovered that SquirrelMail did not properly sanitize CascadingStyle Sheets (CSS) directives used in HTML mail. A remote attacker couldsend a specially-crafted email that could place mail content aboveSquirrelMail's controls, possibly allowing phishing and cross-sitescripting attacks. (CVE-2009-1581)Users of squirrelmail should upgrade to this updated package, whichcontains backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-squirrelmail

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;