RHEL 3 / 4 / 5 : squirrelmail (RHSA-2009:1490)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated squirrelmail package that fixes several security issues is
now available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

SquirrelMail is a standards-based webmail package written in PHP.

Form submissions in SquirrelMail did not implement protection against
Cross-Site Request Forgery (CSRF) attacks. If a remote attacker
tricked a user into visiting a malicious web page, the attacker could
hijack that user's authentication, inject malicious content into that
user's preferences, or possibly send mail without that user's
permission. (CVE-2009-2964)

Users of SquirrelMail should upgrade to this updated package, which
contains a backported patch to correct these issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2009-2964.html
http://www.squirrelmail.org/security/issue/2009-08-12
http://rhn.redhat.com/errata/RHSA-2009-1490.html

Solution :

Update the affected squirrelmail package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 42077 ()

Bugtraq ID: 36196

CVE ID: CVE-2009-2964