Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.831438
Category:Mandrake Local Security Checks
Title:Mandriva Update for squirrelmail MDVSA-2011:123 (squirrelmail)
Summary:The remote host is missing an update for the 'squirrelmail'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'squirrelmail'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Multiple vulnerabilities has been discovered and corrected in
squirrelmail:

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not
prevent page rendering inside a frame in a third-party HTML document,
which makes it easier for remote attackers to conduct clickjacking
attacks via a crafted web site (CVE-2010-4554).

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail
1.4.21 and earlier allow remote attackers to inject arbitrary
web script or HTML via vectors involving (1) drop-down selection
lists, (2) the > (greater than) character in the SquirrelSpell
spellchecking plugin, and (3) errors associated with the Index Order
(aka options_order) page (CVE-2010-4555).

Cross-site scripting (XSS) vulnerability in functions/mime.php in
SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary
web script or HTML via a crafted STYLE element in an e-mail message
(CVE-2011-2023).

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier
allows remote attackers to modify or add preference values via a \n
(newline) character, a different vulnerability than CVE-2010-4555
(CVE-2011-2752).

Multiple cross-site request forgery (CSRF) vulnerabilities in
SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the
authentication of unspecified victims via vectors involving (1) the
empty trash implementation and (2) the Index Order (aka options_order)
page, a different issue than CVE-2010-4555 (CVE-2011-2753).

The updated packages have been upgraded to the 1.4.22 version which
is not vulnerable to these issues.

Affected Software/OS:
squirrelmail on Mandriva Enterprise Server 5,
Mandriva Enterprise Server 5/X86_64

Solution:
Please Install the Updated Packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4554
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
Debian Security Information: DSA-2291 (Google Search)
http://www.debian.org/security/2011/dsa-2291
http://www.mandriva.com/security/advisories?name=MDVSA-2011:123
RedHat Security Advisories: RHSA-2012:0103
http://rhn.redhat.com/errata/RHSA-2012-0103.html
XForce ISS Database: squirrelmail-http-clickjacking(68512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68512
Common Vulnerability Exposure (CVE) ID: CVE-2010-4555
XForce ISS Database: squirrelmail-dropdown-xss(68510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68510
XForce ISS Database: squirrelmail-spellchecking-xss(68511)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68511
Common Vulnerability Exposure (CVE) ID: CVE-2011-2023
http://securitytracker.com/id?1025766
Common Vulnerability Exposure (CVE) ID: CVE-2011-2752
XForce ISS Database: squirrelmail-newline-crlf-injection(68587)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68587
Common Vulnerability Exposure (CVE) ID: CVE-2011-2753
XForce ISS Database: squirrelmail-authentication-csrf(68586)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68586
CopyrightCopyright (c) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.