Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70102
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2011:123 (squirrelmail)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to squirrelmail
announced via advisory MDVSA-2011:123.

Multiple vulnerabilities has been discovered and corrected in
squirrelmail:

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not
prevent page rendering inside a frame in a third-party HTML document,
which makes it easier for remote attackers to conduct clickjacking
attacks via a crafted web site (CVE-2010-4554).

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail
1.4.21 and earlier allow remote attackers to inject arbitrary
web script or HTML via vectors involving (1) drop-down selection
lists, (2) the > (greater than) character in the SquirrelSpell
spellchecking plugin, and (3) errors associated with the Index Order
(aka options_order) page (CVE-2010-4555).

Cross-site scripting (XSS) vulnerability in functions/mime.php in
SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary
web script or HTML via a crafted STYLE element in an e-mail message
(CVE-2011-2023).

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier
allows remote attackers to modify or add preference values via a \n
(newline) character, a different vulnerability than CVE-2010-4555
(CVE-2011-2752).

Multiple cross-site request forgery (CSRF) vulnerabilities in
SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the
authentication of unspecified victims via vectors involving (1) the
empty trash implementation and (2) the Index Order (aka options_order)
page, a different issue than CVE-2010-4555 (CVE-2011-2753).

The updated packages have been upgraded to the 1.4.22 version which
is not vulnerable to these issues.

Affected: Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:123

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4554
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Debian Security Information: DSA-2291 (Google Search)
http://www.debian.org/security/2011/dsa-2291
http://www.mandriva.com/security/advisories?name=MDVSA-2011:123
RedHat Security Advisories: RHSA-2012:0103
http://rhn.redhat.com/errata/RHSA-2012-0103.html
XForce ISS Database: squirrelmail-http-clickjacking(68512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68512
Common Vulnerability Exposure (CVE) ID: CVE-2010-4555
XForce ISS Database: squirrelmail-dropdown-xss(68510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68510
XForce ISS Database: squirrelmail-spellchecking-xss(68511)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68511
Common Vulnerability Exposure (CVE) ID: CVE-2011-2023
http://securitytracker.com/id?1025766
Common Vulnerability Exposure (CVE) ID: CVE-2011-2752
XForce ISS Database: squirrelmail-newline-crlf-injection(68587)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68587
Common Vulnerability Exposure (CVE) ID: CVE-2011-2753
XForce ISS Database: squirrelmail-authentication-csrf(68586)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68586
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.