int(1670)

Vulnerability Bulletins


Múltiples vulnerabilidades de cross-site scripting en SquirrelMail

Vulnerability classification

Property Value
Confidence level Oficial
Impact Aumento de la visibilidad
Dificulty Avanzado
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software SquirrelMail

Description

Se han descubierto múltiples vulnerabilidades de cross-site scripting en SquirrelMail.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto robar cookies o comprometer la cuenta webmail de un usuario mediante URLs especialmente diseñadas que hagan uso de la aplicación vulnerable.

Solution



Actualización de software

Mandriva Linux

Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-1.4.2-11.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/squirrelmail-1.4.2-11.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-1.4.2-11.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.2-11.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/squirrelmail-1.4.2-11.1.C30mdk.src.rpm

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.dsc
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.diff.gz
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4_all.deb

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.dsc
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1_all.deb

SUSE Linux
Actualizar mediante YaST Online Update

Red Hat Linux
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Standar resources

Property Value
CVE CAN-2005-1769
BID

Other resources

Mandriva Security Advisories
http://www.mandriva.com/security/advisories?name=MDKSA-2005:108

Debian Security Advisory DSA 756-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00142.html

SUSE Security Summary Report SUSE-SR:2005:018
http://www.novell.com/linux/security/advisories/2005_18_sr.html

Red Hat Security Advisory RHSA-2005:595-12
https://rhn.redhat.com/errata/RHSA-2005-595.html

Version history

Version Comments Date
1.0 Aviso emitido 2005-07-01
1.1 Aviso emitido por Debian (DSA 756-1) 2005-07-14
1.2 Aviso emitido por SUSE (SUSE-SR:2005:018) 2005-08-02
1.3 Aviso emitido por Red Hat (RHSA-2005:595-12) 2005-08-04
Ministerio de Defensa
CNI
CCN
CCN-CERT