GLSA-201001-08 : SquirrelMail: Multiple vulnerabilities

medium Nessus Plugin ID 44897



The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201001-08 (SquirrelMail: Multiple vulnerabilities)

Multiple vulnerabilities were found in SquirrelMail:
Niels Teusink reported multiple input sanitation flaws in certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php, PHP_SELF and the query string (aka QUERY_STRING) (CVE-2009-1578).
Niels Teusink also reported that the map_yp_alias() function in functions/imap_general.php does not filter shell metacharacters in a username and that the original patch was incomplete (CVE-2009-1381, CVE-2009-1579).
Tomas Hoger discovered an unspecified session fixation vulnerability (CVE-2009-1580).
Luc Beurton reported that functions/mime.php does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages (CVE-2009-1581).
Impact :

The vulnerabilities allow remote attackers to execute arbitrary code with the privileges of the user running the web server, to hijack web sessions via a crafted cookie, to spoof the user interface and to conduct Cross-Site Scripting and phishing attacks, via a specially crafted message.
Workaround :

There is no known workaround at this time.


All SquirrelMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.19'

See Also

Plugin Details

Severity: Medium

ID: 44897

File Name: gentoo_GLSA-201001-08.nasl

Version: 1.11

Type: local

Published: 2/25/2010

Updated: 1/6/2021

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Medium

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:squirrelmail, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/13/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1381, CVE-2009-1578, CVE-2009-1579, CVE-2009-1580, CVE-2009-1581

GLSA: 201001-08

CWE: 79, 94, 287