Vulnerability Bulletins |
Vulnerabilidad en el manejo de variables en squirrelmail |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software | squirrelmail |
Description |
|
Se ha descubierto una vulnerabilidad en squirrelmail. La vulnerabilidad reside en el manejo de variables. La explotación de esta vulnerabilidad podría permitir a un atacante remoto obtener y alterar las preferencias de otros usuarios, escribir archivos en el sistema que hospeda squirrelmail con privilegios www-data y lanzar ataques de cross-site scripting. |
|
Solution |
|
Actualización de software Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.dsc http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4.diff.gz http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-4_all.deb Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.dsc http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1.diff.gz http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-6sarge1_all.deb SUSE Linux Actualizar mediante YaST Online Update Red Hat Linux Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Mandriva Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/squirrelmail-1.4.5-1.1.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-1.4.5-1.1.C30mdk.noarch.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squirrelmail-poutils-1.4.5-1.1.C30mdk.noarch.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/squirrelmail-1 |
|
Standar resources |
|
Property | Value |
CVE | CAN-2005-2095 |
BID | |
Other resources |
|
Debian Security Advisory DSA 756-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00142.html SUSE Security Summary Report SUSE-SR:2005:018 http://www.novell.com/linux/security/advisories/2005_18_sr.html Red Hat Security Advisory RHSA-2005:595-12 https://rhn.redhat.com/errata/RHSA-2005-595.html Mandriva Security Advisory (MDKSA-2005:202) http://www.mandriva.com/security/advisories?name=MDKSA-2005:202 |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2005-07-14 |
1.1 | Aviso emitido por SUSE (SUSE-SR:2005:018) | 2005-08-02 |
1.2 | Aviso emitido por Red Hat (RHSA-2005:595-12) | 2005-08-04 |
1.3 | Aviso emitido por Mandriva (MDKSA-2005:202) | 2005-11-03 |