Lucene search

K
centosCentOS ProjectCESA-2009:1490
HistoryOct 08, 2009 - 8:55 p.m.

squirrelmail security update

2009-10-0820:55:32
CentOS Project
lists.centos.org
43

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.4%

CentOS Errata and Security Advisory CESA-2009:1490

SquirrelMail is a standards-based webmail package written in PHP.

Form submissions in SquirrelMail did not implement protection against
Cross-Site Request Forgery (CSRF) attacks. If a remote attacker tricked a
user into visiting a malicious web page, the attacker could hijack that
user’s authentication, inject malicious content into that user’s
preferences, or possibly send mail without that user’s permission.
(CVE-2009-2964)

Users of SquirrelMail should upgrade to this updated package, which
contains a backported patch to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2009-October/078343.html
https://lists.centos.org/pipermail/centos-announce/2009-October/078344.html
https://lists.centos.org/pipermail/centos-announce/2009-October/078347.html
https://lists.centos.org/pipermail/centos-announce/2009-October/078348.html

Affected packages:
squirrelmail

Upstream details at:
https://access.redhat.com/errata/RHSA-2009:1490

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.4%