int(1704)

Vulnerability Bulletins


Vulnerabilidad en el manejo de variables en squirrelmail

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software squirrelmail

Description

Se ha descubierto una vulnerabilidad en squirrelmail. La vulnerabilidad reside en el manejo de variables.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto obtener y alterar las preferencias de otros usuarios, escribir archivos en el sistema que hospeda squirrelmail con privilegios www-data y lanzar ataques de cross-site scripting.

Solution



Actualización de software

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.dsc
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.diff.gz
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4_all.deb

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.dsc
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1_all.deb

SUSE Linux
Actualizar mediante YaST Online Update

Red Hat Linux
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/squirrelmail-1.4.5-1.1.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/squirrelmail-1

Standar resources

Property Value
CVE CAN-2005-2095
BID

Other resources

Debian Security Advisory DSA 756-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00142.html

SUSE Security Summary Report SUSE-SR:2005:018
http://www.novell.com/linux/security/advisories/2005_18_sr.html

Red Hat Security Advisory RHSA-2005:595-12
https://rhn.redhat.com/errata/RHSA-2005-595.html

Mandriva Security Advisory (MDKSA-2005:202)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:202

Version history

Version Comments Date
1.0 Aviso emitido 2005-07-14
1.1 Aviso emitido por SUSE (SUSE-SR:2005:018) 2005-08-02
1.2 Aviso emitido por Red Hat (RHSA-2005:595-12) 2005-08-04
1.3 Aviso emitido por Mandriva (MDKSA-2005:202) 2005-11-03
Ministerio de Defensa
CNI
CCN
CCN-CERT