Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 756-1 (squirrelmail)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

4.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to squirrelmail announced via advisory DSA 756-1. Several vulnerabilities have been discovered in Squirrelmail, a commonly used webmail system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-1769 Martijn Brinkers discovered cross-site scripting vulnerabilities that allow remote attackers to inject arbitrary web script or HTML in the URL and e-mail messages. CVE-2005-2095 James Bercegay of GulfTech Security discovered a vulnerability in the variable handling which could lead to attackers altering other people's preferences and possibly reading them, writing files at any location writable for www-data and cross site scripting. For the old stable distribution (woody) these problems have been fixed in version 1.2.6-4.

Solution

Solution

For the stable distribution (sarge) these problems have been fixed in version 1.4.4-6sarge1. For the unstable distribution (sid) these problems have been fixed in version 1.4.4-6sarge1. We recommend that you upgrade your squirrelmail package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20756-1

Common Vulnerabilities and Exposures (CVE)