squirrelmail security update

ID CESA-2005:595-02
Type centos
Reporter CentOS Project
Modified 2005-08-06T17:32:09


CentOS Errata and Security Advisory CESA-2005:595-02

SquirrelMail is a standards-based webmail package written in PHP4.

A bug was found in the way SquirrelMail handled the $_POST variable. If a user is tricked into visiting a malicious URL, the user's SquirrelMail preferences could be read or modified. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-2095 to this issue.

Several cross-site scripting bugs were discovered in SquirrelMail. An attacker could inject arbitrary Javascript or HTML content into SquirrelMail pages by tricking a user into visiting a carefully crafted URL, or by sending them a carefully constructed HTML email message. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-1769 to this issue.

All users of SquirrelMail should upgrade to this updated package, which contains backported patches that resolve these issues.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2005-August/012006.html http://lists.centos.org/pipermail/centos-announce/2005-August/012007.html http://lists.centos.org/pipermail/centos-announce/2005-August/012009.html http://lists.centos.org/pipermail/centos-announce/2005-August/012010.html http://lists.centos.org/pipermail/centos-announce/2005-August/012012.html http://lists.centos.org/pipermail/centos-announce/2005-August/012013.html

Affected packages: squirrelmail

Upstream details at: https://rhn.redhat.com/errata/RHSA-2005-595.html