squirrelmail security update

ID CESA-2007:0022
Type centos
Reporter CentOS Project
Modified 2007-02-03T19:43:55


CentOS Errata and Security Advisory CESA-2007:0022

SquirrelMail is a standards-based webmail package written in PHP.

Several cross-site scripting bugs were discovered in SquirrelMail. An attacker could inject arbitrary Javascript or HTML content into SquirrelMail pages by tricking a user into visiting a carefully crafted URL. (CVE-2006-6142)

Users of SquirrelMail should upgrade to this erratum package, which contains a backported patch to correct these issues.

Notes: - After installing this update, users are advised to restart their httpd service to ensure that the updated version functions correctly. - config.php should NOT be modified, please modify config_local.php instead. - Known Bug: The configuration generator may potentially produce bad options that interfere with the operation of this application. Applying specific config changes to config_local.php manually is recommended.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2007-February/025538.html http://lists.centos.org/pipermail/centos-announce/2007-February/025539.html http://lists.centos.org/pipermail/centos-announce/2007-February/025540.html http://lists.centos.org/pipermail/centos-announce/2007-February/025541.html http://lists.centos.org/pipermail/centos-announce/2007-January/025525.html http://lists.centos.org/pipermail/centos-announce/2007-January/025526.html

Affected packages: squirrelmail

Upstream details at: https://rhn.redhat.com/errata/RHSA-2007-0022.html