How to Buy
This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201001-08
(SquirrelMail: Multiple vulnerabilities)
Multiple vulnerabilities were found in SquirrelMail:
Teusink reported multiple input sanitation flaws in certain encrypted
strings in e-mail headers, related to contrib/decrypt_headers.php,
PHP_SELF and the query string (aka QUERY_STRING) (CVE-2009-1578).
Niels Teusink also reported that the map_yp_alias() function
in functions/imap_general.php does not filter shell metacharacters in a
username and that the original patch was incomplete (CVE-2009-1381,
Tomas Hoger discovered an unspecified session fixation
Luc Beurton reported that functions/mime.php does not protect
the application's content from Cascading Style Sheets (CSS) positioning
in HTML e-mail messages (CVE-2009-1581).
The vulnerabilities allow remote attackers to execute arbitrary code
with the privileges of the user running the web server, to hijack web
sessions via a crafted cookie, to spoof the user interface and to
conduct Cross-Site Scripting and phishing attacks, via a specially
There is no known workaround at this time.
See also :
All SquirrelMail users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.19'
Risk factor :
Medium / CVSS Base Score : 6.8
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 44897 (gentoo_GLSA-201001-08.nasl)
CVE ID: CVE-2009-1381CVE-2009-1578CVE-2009-1579CVE-2009-1580CVE-2009-1581
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.