Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.870880 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for squirrelmail RHSA-2013:0126-01 |
Summary: | The remote host is missing an update for the 'squirrelmail'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'squirrelmail' package(s) announced via the referenced advisory. Vulnerability Insight: SquirrelMail is a standards-based webmail package written in PHP. The SquirrelMail security update RHSA-2012:0103 did not, unlike the erratum text stated, correct the CVE-2010-2813 issue, a flaw in the way SquirrelMail handled failed log in attempts. A user preference file was created when attempting to log in with a password containing an 8-bit character, even if the username was not valid. A remote attacker could use this flaw to eventually consume all hard disk space on the target SquirrelMail server. (CVE-2012-2124) This update also fixes the following bugs: * Prior to this update, SquirrelMail could not decode multi-line subjects properly. Consequently, the decode header internationalization option did not properly handle new lines or tabs at the beginning of the lines. This bug has been fixed and SquirrelMail now works correctly in the described scenario. (BZ#241861) * Due to a bug, attachments written in HTML code on the Windows operating system were not displayed properly when accessed with SquirrelMail. The '!=null' string was trimmed to '!ull'. This bug has been fixed and the attachments are now displayed correctly in such a case. (BZ#359791) * Previously, e-mail messages with a Unique Identifier (UID) larger than 2^31 bytes were unreadable when using the squirrelmail package. With this patch the squirrelmail package is able to read all messages regardless of the UIDs size. (BZ#450780) * Due to a bug, a PHP script did not assign the proper character set to requested variables. Consequently, SquirrelMail could not display any e-mails. The underlying source code has been modified and now the squirrelmail package assigns the correct character set. (BZ#475188) Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: squirrelmail on Red Hat Enterprise Linux (v. 5 server) Solution: Please Install the Updated Packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2124 http://www.openwall.com/lists/oss-security/2012/04/20/22 RedHat Security Advisories: RHSA-2013:0126 http://rhn.redhat.com/errata/RHSA-2013-0126.html http://secunia.com/advisories/51730 Common Vulnerability Exposure (CVE) ID: CVE-2010-2813 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html BugTraq ID: 42399 http://www.securityfocus.com/bid/42399 Debian Security Information: DSA-2091 (Google Search) http://www.debian.org/security/2010/dsa-2091 http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045372.html http://lists.fedoraproject.org/pipermail/package-announce/2010-August/045383.html RedHat Security Advisories: RHSA-2012:0103 http://rhn.redhat.com/errata/RHSA-2012-0103.html http://secunia.com/advisories/40964 http://secunia.com/advisories/40971 http://www.vupen.com/english/advisories/2010/2070 http://www.vupen.com/english/advisories/2010/2080 XForce ISS Database: squirrelmail-imap-dos(61124) https://exchange.xforce.ibmcloud.com/vulnerabilities/61124 |
Copyright | Copyright (c) 2013 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |