GLSA-200708-08 : SquirrelMail G/PGP plugin: Arbitrary code execution

High Nessus Plugin ID 25873


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200708-08 (SquirrelMail G/PGP plugin: Arbitrary code execution)

The functions deletekey(), gpg_check_sign_pgp_mime() and gpg_recv_key() used in the SquirrelMail G/PGP encryption plugin do not properly escape user-supplied data.
Impact :

An authenticated user could use the plugin to execute arbitrary code on the server, or a remote attacker could send a specially crafted e-mail to a SquirrelMail user, possibly leading to the execution of arbitrary code with the privileges of the user running the underlying web server.
Note that the G/PGP plugin is disabled by default.
Workaround :

Enter the SquirrelMail configuration directory (/usr/share/webapps/squirrelmail/version/htdocs/config), then execute the script. Select the plugins menu, then select the gpg plugin item number in the 'Installed Plugins' list to disable it. Press S to save your changes, then Q to quit.


All SquirrelMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.10a-r2'

See Also

Plugin Details

Severity: High

ID: 25873

File Name: gentoo_GLSA-200708-08.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2007/08/13

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:squirrelmail, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2007/08/11

Vulnerability Publication Date: 2007/07/11

Reference Information

CVE: CVE-2005-1924, CVE-2006-4169

OSVDB: 37923, 37924, 37932, 37933

GLSA: 200708-08