This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200506-19
(SquirrelMail: Several XSS vulnerabilities)
SquirrelMail is vulnerable to several cross-site scripting issues,
most reported by Martijn Brinkers.
By enticing a user to read a specially crafted e-mail or using a
manipulated URL, an attacker can execute arbitrary scripts running in
the context of the victim's browser. This could lead to a compromise of
the user's webmail account, cookie theft, etc.
There is no known workaround at this time.
See also :
All SquirrelMail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.4'
Note: Users with the vhosts USE flag set should manually use
webapp-config to finalize the update.
Risk factor :
Medium / CVSS Base Score : 4.3
Family: Gentoo Local Security Checks
Nessus Plugin ID: 18545 (gentoo_GLSA-200506-19.nasl)
CVE ID: CVE-2005-1769
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.