RHEL 3 : squirrelmail (RHSA-2004:240)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated SquirrelMail package that fixes several security
vulnerabilities is now available.

SquirrelMail is a webmail package written in PHP. Multiple
vulnerabilities have been found which affect the version of
SquirrelMail shipped with Red Hat Enterprise Linux 3.

An SQL injection flaw was found in SquirrelMail version 1.4.2 and
earlier. If SquirrelMail is configured to store user addressbooks in
the database, a remote attacker could use this flaw to execute
arbitrary SQL statements. The Common Vulnerabilities and Exposures
project has assigned the name CVE-2004-0521 to this issue.

A number of cross-site scripting (XSS) flaws in SquirrelMail version
1.4.2 and earlier could allow remote attackers to execute script as
other web users. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520
to these issues.

All users of SquirrelMail are advised to upgrade to the erratum
package containing SquirrelMail version 1.4.3a which is not vulnerable
to these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2004-0519.html
https://www.redhat.com/security/data/cve/CVE-2004-0520.html
https://www.redhat.com/security/data/cve/CVE-2004-0521.html
http://marc.info/?l=squirrelmail-announce&m=108595407012256
http://rhn.redhat.com/errata/RHSA-2004-240.html

Solution :

Update the affected squirrelmail package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12503 ()

Bugtraq ID:

CVE ID: CVE-2004-0519
CVE-2004-0520
CVE-2004-0521