GLSA-201001-08 : SquirrelMail: Multiple vulnerabilities

Medium Nessus Plugin ID 44897


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201001-08 (SquirrelMail: Multiple vulnerabilities)

Multiple vulnerabilities were found in SquirrelMail:
Niels Teusink reported multiple input sanitation flaws in certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php, PHP_SELF and the query string (aka QUERY_STRING) (CVE-2009-1578).
Niels Teusink also reported that the map_yp_alias() function in functions/imap_general.php does not filter shell metacharacters in a username and that the original patch was incomplete (CVE-2009-1381, CVE-2009-1579).
Tomas Hoger discovered an unspecified session fixation vulnerability (CVE-2009-1580).
Luc Beurton reported that functions/mime.php does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages (CVE-2009-1581).
Impact :

The vulnerabilities allow remote attackers to execute arbitrary code with the privileges of the user running the web server, to hijack web sessions via a crafted cookie, to spoof the user interface and to conduct Cross-Site Scripting and phishing attacks, via a specially crafted message.
Workaround :

There is no known workaround at this time.


All SquirrelMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.19'

See Also

Plugin Details

Severity: Medium

ID: 44897

File Name: gentoo_GLSA-201001-08.nasl

Version: 1.10

Type: local

Published: 2010/02/25

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:squirrelmail, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/01/13

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1381, CVE-2009-1578, CVE-2009-1579, CVE-2009-1580, CVE-2009-1581

GLSA: 201001-08

CWE: 79, 94, 287