RHEL 3 / 4 / 5 : squirrelmail (RHSA-2009:1490)

Medium Nessus Plugin ID 42077


The remote Red Hat host is missing a security update.


An updated squirrelmail package that fixes several security issues is now available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

SquirrelMail is a standards-based webmail package written in PHP.

Form submissions in SquirrelMail did not implement protection against Cross-Site Request Forgery (CSRF) attacks. If a remote attacker tricked a user into visiting a malicious web page, the attacker could hijack that user's authentication, inject malicious content into that user's preferences, or possibly send mail without that user's permission. (CVE-2009-2964)

Users of SquirrelMail should upgrade to this updated package, which contains a backported patch to correct these issues.


Update the affected squirrelmail package.

See Also




Plugin Details

Severity: Medium

ID: 42077

File Name: redhat-RHSA-2009-1490.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2009/10/09

Modified: 2017/01/03

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:squirrelmail, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/10/08

Reference Information

CVE: CVE-2009-2964

BID: 36196

RHSA: 2009:1490

CWE: 352