RedHat: Moderate: squirrelmail security update

    Date15 Feb 2005
    CategoryRed Hat
    5327
    Posted ByJoe Shakespeare
    An updated Squirrelmail package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: squirrelmail security update
    Advisory ID:       RHSA-2005:099-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-099.html
    Issue date:        2005-02-15
    Updated on:        2005-02-15
    Product:           Red Hat Enterprise Linux
    CVE Names:         CAN-2005-0075 CAN-2005-0103 CAN-2005-0104
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    An updated Squirrelmail package that fixes several security issues is now
    available for Red Hat Enterprise Linux 4.
    
    This update has been rated as having moderate security impact by the Red Hat
    Security Response Team.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS version 4 - noarch
    Red Hat Enterprise Linux Desktop version 4 - noarch
    Red Hat Enterprise Linux ES version 4 - noarch
    Red Hat Enterprise Linux WS version 4 - noarch
    
    3. Problem description:
    
    SquirrelMail is a standards-based webmail package written in PHP4.
    
    Jimmy Conner discovered a missing variable initialization in Squirrelmail.
    This flaw could allow potential insecure file inclusions on servers where
    the PHP setting "register_globals" is set to "On". This is not a default or
    recommended setting. The Common Vulnerabilities and Exposures project
    (cve.mitre.org) has assigned the name CAN-2005-0075 to this issue.
    
    A URL sanitisation bug was found in Squirrelmail. This flaw could allow a
    cross site scripting attack when loading the URL for the sidebar. The
    Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
    the name CAN-2005-0103 to this issue.
    
    A missing variable initialization bug was found in Squirrelmail. This flaw
    could allow a cross site scripting attack. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CAN-2005-0104 to
    this issue.
    
    Users of Squirrelmail are advised to upgrade to this updated package,
    which contains backported patches to correct these issues.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    145387 - CAN-2005-0075 Arbitrary code injection in Squirrelmail
    145967 - CAN-2005-0103 Multiple issues in squirrelmail (CAN-2005-0104)
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/squirrelmail-1.4.3a-9.EL4.src.rpm
    67b27d7b6cf0638bc11ebf95f7b3f7f8  squirrelmail-1.4.3a-9.EL4.src.rpm
    
    noarch:
    37baa8ae8e06f758db9f3026edb96a29  squirrelmail-1.4.3a-9.EL4.noarch.rpm
    
    Red Hat Enterprise Linux Desktop version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/squirrelmail-1.4.3a-9.EL4.src.rpm
    67b27d7b6cf0638bc11ebf95f7b3f7f8  squirrelmail-1.4.3a-9.EL4.src.rpm
    
    noarch:
    37baa8ae8e06f758db9f3026edb96a29  squirrelmail-1.4.3a-9.EL4.noarch.rpm
    
    Red Hat Enterprise Linux ES version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/squirrelmail-1.4.3a-9.EL4.src.rpm
    67b27d7b6cf0638bc11ebf95f7b3f7f8  squirrelmail-1.4.3a-9.EL4.src.rpm
    
    noarch:
    37baa8ae8e06f758db9f3026edb96a29  squirrelmail-1.4.3a-9.EL4.noarch.rpm
    
    Red Hat Enterprise Linux WS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/squirrelmail-1.4.3a-9.EL4.src.rpm
    67b27d7b6cf0638bc11ebf95f7b3f7f8  squirrelmail-1.4.3a-9.EL4.src.rpm
    
    noarch:
    37baa8ae8e06f758db9f3026edb96a29  squirrelmail-1.4.3a-9.EL4.noarch.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://www.squirrelmail.org/security/issue/2005-01-20
    http://www.squirrelmail.org/security/issue/2005-01-19
    http://www.squirrelmail.org/security/issue/2005-01-14
    http://www.php.net/register_globals
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0075
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0103
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.