Jump to content

Advisories (MDKSA-2006:049 ): squirrelmail


aru
 Share

Recommended Posts

Mandriva Advisories MDKSA-2006:049 : squirrelmail

 

Updated squirrelmail packages fix vulnerabilities

February 27th, 2006

 

Webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS. (CVE-2006-0188) Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer. (CVE-2006-0195) CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka "IMAP injection." (CVE-2006-0377) Updated packages are patched to address these issues.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • CS3.0

Full information about this advisory, including the updated packages, is available at:

wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:049

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0188

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0195

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0377

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...