squirrelmail-1.4.8-5.7AXS3
エラータID: AXSA:2009-60:01
SquirrelMail is a standards-based webmail package written in PHP4. It includes built-in pure PHP support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no Javascript) for maximum compatibility across browsers. It has very few requirements and is very easy to configure and install. SquirrelMail has all the functionality you would want from an email client, including strong MIME support, address books, and folder manipulation.
Fixed bugs:
CVE-2009-1578
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
CVE-2009-1579
The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
CVE-2009-1581
functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
Update packages.
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
N/A
SRPMS
- squirrelmail-1.4.8-5.7AXS3.src.rpm
MD5: cdee154ae21254a4590f79cf7dc04559
SHA-256: 7623f1a8898b98482c7625dbf7f778eab0cca481bfc5ddff2a8117f558889a54
Size: 3.00 MB
Asianux Server 3 for x86
- squirrelmail-1.4.8-5.7AXS3.noarch.rpm
MD5: 67cb78db41ee78db3c9a4118d3cbd480
SHA-256: 5136ab48a3ec32947e402a2cdf9de301fc5a680477289d9e1708d1ee18357d27
Size: 4.32 MB
Asianux Server 3 for x86_64
- squirrelmail-1.4.8-5.7AXS3.noarch.rpm
MD5: c2585ff1a13c2fca2b28683feba13a46
SHA-256: 0cd6bb3911e6f17f2d420998cdf1a1bc8f07225c1748c3c9300e1ca02496133b
Size: 4.32 MB