CentOS Errata and Security Advisory CESA-2006:0283
SquirrelMail is a standards-based webmail package written in PHP4.
A bug was found in the way SquirrelMail presents the right frame to the user. If a user can be tricked into opening a carefully crafted URL, it is possible to present the user with arbitrary HTML data. (CVE-2006-0188)
A bug was found in the way SquirrelMail filters incoming HTML email. It is possible to cause a victim's web browser to request remote content by opening a HTML email while running a web browser that processes certain types of invalid style sheets. Only Internet Explorer is known to process such malformed style sheets. (CVE-2006-0195)
A bug was found in the way SquirrelMail processes a request to select an IMAP mailbox. If a user can be tricked into opening a carefully crafted URL, it is possible to execute arbitrary IMAP commands as the user viewing their mail with SquirrelMail. (CVE-2006-0377)
Users of SquirrelMail are advised to upgrade to this updated package, which contains SquirrelMail version 1.4.6 and is not vulnerable to these issues.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2006-May/024900.html http://lists.centos.org/pipermail/centos-announce/2006-May/024901.html http://lists.centos.org/pipermail/centos-announce/2006-May/024903.html http://lists.centos.org/pipermail/centos-announce/2006-May/024905.html http://lists.centos.org/pipermail/centos-announce/2006-May/024909.html http://lists.centos.org/pipermail/centos-announce/2006-May/024911.html http://lists.centos.org/pipermail/centos-announce/2006-May/024912.html http://lists.centos.org/pipermail/centos-announce/2006-May/024915.html http://lists.centos.org/pipermail/centos-announce/2006-May/024916.html
Affected packages: squirrelmail
Upstream details at: https://rhn.redhat.com/errata/RHSA-2006-0283.html