|
Family: Debian Local Security Checks --> Category: infos
[DSA988] DSA-988-1 squirrelmail Vulnerability Scan
Vulnerability Scan Summary DSA-988-1 squirrelmail
Detailed Explanation for this Vulnerability Test
Several vulnerabilities have been discovered in Squirrelmail, a
commonly used webmail system. The Common Vulnerabilities and
Exposures project identifies the following problems:
Martijn Brinkers and Ben Maurer found a flaw in webmail.php that
allows remote attackers to inject arbitrary web pages into the right
frame via a URL in the right_frame parameter.
Martijn Brinkers and Scott Hughes discovered an interpretation
conflict in the MagicHTML filter that allows remote attackers to
conduct cross-site scripting (XSS) attacks via style sheet
specifiers with invalid (1) "/*" and "*/" comments, or (2) slashes
inside the "url" keyword, which is processed by some web browsers
including Internet Explorer.
Vicente Aguilera of Internet Security Auditors, S.L. discovered a
CRLF injection vulnerability, which allows remote attackers to
inject arbitrary IMAP commands via newline characters in the mailbox
parameter of the sqimap_mailbox_select command, aka "IMAP
injection." There's no known way to exploit this yet.
For the old stable distribution (woody) these problems have been fixed in
version 1.2.6-5.
For the stable distribution (sarge) these problems have been fixed in
version 2:1.4.4-8.
For the unstable distribution (sid) these problems have been fixed in
version 2:1.4.6-1.
We recommend that you upgrade your squirrelmail package.
Solution : http://www.debian.org/security/2006/dsa-988
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|