Debian Security Advisory

DSA-1154-1 squirrelmail -- variable overwriting

Date Reported:
20 Aug 2006
Affected Packages:
squirrelmail
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2006-4019.
More information:

James Bercegay of GulfTech Security Research discovered a vulnerability in SquirrelMail where an authenticated user could overwrite random variables in the compose script. This might be exploited to read or write the preferences or attachment files of other users.

For the stable distribution (sarge) this problem has been fixed in version 1.4.4-9.

For the unstable distribution (sid) this problem has been fixed in version 1.4.8-1.

We recommend that you upgrade your squirrelmail package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.dsc
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.diff.gz
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9_all.deb

MD5 checksums of the listed files are available in the original advisory.