RHEL 3 : squirrelmail (RHSA-2004:654)

Medium Nessus Plugin ID 16053


The remote Red Hat host is missing a security update.


An updated SquirrelMail package that fixes a cross-site scripting vulnerability is now available.

SquirrelMail is a webmail package written in PHP.

A cross-site scripting bug has been found in SquirrelMail. This issue could allow an attacker to send a mail with a carefully crafted header, which could result in causing the victim's machine to execute a malicious script. The Common Vulnerabilities and Exposures project has assigned the name CVE-2004-1036 to this issue.

Additionally, the following issues have been addressed :

- updated splash screens - HIGASHIYAMA Masato's patch to improve Japanese support - real 1.4.3a tarball - config_local.php and default_pref in /etc/squirrelmail/ to match upstream RPM.

Please note that it is possible that upgrading to this package may remove your SquirrelMail configuration files due to a bug in the RPM package. Upgrading will prevent this from happening in the future.

Users of SquirrelMail are advised to upgrade to this updated package which contains a patched version of SquirrelMail version 1.43a and is not vulnerable to these issues.


Update the affected squirrelmail package.

See Also



Plugin Details

Severity: Medium

ID: 16053

File Name: redhat-RHSA-2004-654.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2004/12/27

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:squirrelmail, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2004/12/23

Vulnerability Publication Date: 2004/11/10

Reference Information

CVE: CVE-2004-1036

OSVDB: 11603

RHSA: 2004:654