Lucene search

K
redhatRedHatRHSA-2004:654
HistoryDec 23, 2004 - 12:00 a.m.

(RHSA-2004:654) squirrelmail security update

2004-12-2300:00:00
access.redhat.com
18

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.027 Low

EPSS

Percentile

89.4%

SquirrelMail is a webmail package written in PHP.

A cross-site scripting bug has been found in SquirrelMail. This issue
could allow an attacker to send a mail with a carefully crafted header,
which could result in causing the victim’s machine to execute a malicious
script. The Common Vulnerabilities and Exposures project has assigned the
name CAN-2004-1036 to this issue.

Additionally, the following issues have been addressed:

  • updated splash screens
  • HIGASHIYAMA Masato’s patch to improve Japanese support
  • real 1.4.3a tarball
  • config_local.php and default_pref in /etc/squirrelmail/ to match upstream
    RPM.

Please note that it is possible that upgrading to this package may remove
your SquirrelMail configuration files due to a bug in the RPM package.
Upgrading will prevent this from happening in the future.

Users of SquirrelMail are advised to upgrade to this updated package which
contains a patched version of SquirrelMail version 1.43a and is not
vulnerable to these issues.

OSVersionArchitecturePackageVersionFilename
RedHatanynoarchsquirrelmail< 1.4.3a-7.EL3squirrelmail-1.4.3a-7.EL3.noarch.rpm

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.027 Low

EPSS

Percentile

89.4%