Debian Security Advisory
DSA-1154-1 squirrelmail -- variable overwriting
- Date Reported:
- 20 Aug 2006
- Affected Packages:
- squirrelmail
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2006-4019.
- More information:
-
James Bercegay of GulfTech Security Research discovered a vulnerability in SquirrelMail where an authenticated user could overwrite random variables in the compose script. This might be exploited to read or write the preferences or attachment files of other users.
For the stable distribution (sarge) this problem has been fixed in version 1.4.4-9.
For the unstable distribution (sid) this problem has been fixed in version 1.4.8-1.
We recommend that you upgrade your squirrelmail package.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.dsc
- http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.diff.gz
- http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.4.4-9_all.deb
MD5 checksums of the listed files are available in the original advisory.