Rapid7 Vulnerability & Exploit Database

RHSA-2012:0103: squirrelmail security update

Back to Search

RHSA-2012:0103: squirrelmail security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/17/2011
Created
07/25/2018
Added
02/21/2012
Modified
07/04/2017

Description

SquirrelMail is a standards-based webmail package written in PHP.A cross-site scripting (XSS) flaw was found in the way SquirrelMailperformed the sanitization of HTML style tag content. A remote attackercould use this flaw to send a specially-crafted Multipurpose Internet MailExtensions (MIME) message that, when opened by a victim, would lead toarbitrary web script execution in the context of their SquirrelMailsession. (CVE-2011-2023)Multiple cross-site scripting (XSS) flaws were found in SquirrelMail. Aremote attacker could possibly use these flaws to execute arbitrary webscript in the context of a victim's SquirrelMail session. (CVE-2010-4555)An input sanitization flaw was found in the way SquirrelMail handled thecontent of various HTML input fields. A remote attacker could use thisflaw to alter user preference values via a newline character contained inthe input for these fields. (CVE-2011-2752)It was found that the SquirrelMail Empty Trash and Index Order pages didnot protect against Cross-Site Request Forgery (CSRF) attacks. If a remoteattacker could trick a user, who was logged into SquirrelMail, intovisiting a specially-crafted URL, the attacker could empty the victim'strash folder or alter the ordering of the columns on the message indexpage. (CVE-2011-2753)SquirrelMail was allowed to be loaded into an HTML sub-frame, allowing aremote attacker to perform a clickjacking attack against logged in usersand possibly gain access to sensitive user data. With this update, theSquirrelMail main frame can only be loaded into the top most browser frame.(CVE-2010-4554)A flaw was found in the way SquirrelMail handled failed log in attempts. Auser preference file was created when attempting to log in with a passwordcontaining an 8-bit character, even if the username was not valid. Aremote attacker could use this flaw to eventually consume all hard diskspace on the target SquirrelMail server. (CVE-2010-2813)A flaw was found in the SquirrelMail Mail Fetch plug-in. If anadministrator enabled this plug-in, a SquirrelMail user could use this flawto port scan the local network the server was on. (CVE-2010-1637)Users of SquirrelMail should upgrade to this updated package, whichcontains backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-squirrelmail

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;