Lucene search

K
osvGoogleOSV:DSA-988-1
HistoryMar 08, 2006 - 12:00 a.m.

squirrelmail - several

2006-03-0800:00:00
Google
osv.dev
5

0.012 Low

EPSS

Percentile

85.3%

Several vulnerabilities have been discovered in Squirrelmail, a
commonly used webmail system. The Common Vulnerabilities and
Exposures project identifies the following problems:

  • CVE-2006-0188
    Martijn Brinkers and Ben Maurer found a flaw in webmail.php that
    allows remote attackers to inject arbitrary web pages into the right
    frame via a URL in the right_frame parameter.
  • CVE-2006-0195
    Martijn Brinkers and Scott Hughes discovered an interpretation
    conflict in the MagicHTML filter that allows remote attackers to
    conduct cross-site scripting (XSS) attacks via style sheet
    specifiers with invalid (1) “/*” and “*/” comments, or (2) slashes
    inside the “url” keyword, which is processed by some web browsers
    including Internet Explorer.
  • CVE-2006-0377
    Vicente Aguilera of Internet Security Auditors, S.L. discovered a
    CRLF injection vulnerability, which allows remote attackers to
    inject arbitrary IMAP commands via newline characters in the mailbox
    parameter of the sqimap_mailbox_select command, aka “IMAP
    injection.” There’s no known way to exploit this yet.

For the old stable distribution (woody) these problems have been fixed in
version 1.2.6-5.

For the stable distribution (sarge) these problems have been fixed in
version 2:1.4.4-8.

For the unstable distribution (sid) these problems have been fixed in
version 2:1.4.6-1.

We recommend that you upgrade your squirrelmail package.