CentOS Errata and Security Advisory CESA-2005:595
SquirrelMail is a standards-based webmail package written in PHP4.
A bug was found in the way SquirrelMail handled the $_POST variable. If a user is tricked into visiting a malicious URL, the user's SquirrelMail preferences could be read or modified. The Common Vulnerabilities and Exposures project assigned the name CAN-2005-2095 to this issue.
All users of SquirrelMail should upgrade to this updated package, which contains backported patches that resolve these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2005-August/011997.html http://lists.centos.org/pipermail/centos-announce/2005-August/011998.html http://lists.centos.org/pipermail/centos-announce/2005-August/011999.html http://lists.centos.org/pipermail/centos-announce/2005-August/012000.html http://lists.centos.org/pipermail/centos-announce/2005-August/012001.html http://lists.centos.org/pipermail/centos-announce/2005-August/012002.html http://lists.centos.org/pipermail/centos-announce/2005-August/012003.html http://lists.centos.org/pipermail/centos-announce/2005-August/012004.html http://lists.centos.org/pipermail/centos-announce/2005-August/012031.html http://lists.centos.org/pipermail/centos-announce/2005-August/012032.html
Affected packages: squirrelmail
Upstream details at: https://rhn.redhat.com/errata/RHSA-2005-595.html